Surprise Castle
/Hacking Hardware: The Practical Guide to Penetration Testing
Hacking Hardware: The Practical Guide to Penetration Testing

Hacking Hardware: The Practical Guide to Penetration Testing - Paperback

$69.95
Quantity
01

Pay over time for orders over $35.00 with

Availability:In StockContributor:Tobias ScheiblePublish date:3/25/2026Pages:644
Language:EnglishPublisher:Rheinwerk ComputingISBN-13:9781493227716ISBN-10:1493227718UPC:9781493227716Book Category:ComputersBook Subcategory:SecuritySize:10.03 x 7.01 x 1.34 inchesWeight:2.5618Product ID:SCGGGNWPV7

Defend your system against hardware-based security breaches by thinking like a hacker! With this guide, master the tools you need to develop preventative IT security tests and measures. Learn how to perform penetration tests step by step, and then evaluate and correct vulnerabilities. Get up to speed on awareness training methods and hacking tools for protecting your hardware. From USB killers and keyloggers to manipulated Wi-Fi connections and beyond, understand real-world attack scenarios and--most importantly--how to prevent them!

In this book, you'll learn about:

a. Penetration Testing and Red Teaming
Where are the vulnerabilities in your infrastructure? How does an attacker see your environment, and what tools do they use? You'll discover that the best attack tools often look simple, yet still cause significant damage.

b. Security Awareness Training
The best virus scanners and firewalls are useless if your team doesn't take the necessary precautions. Learn how to conduct effective awareness training to educate your colleagues about the dangers posed by inconspicuous hardware.

c. Hacking Hardware
Rubber Ducky, USBKill, HackRF One, Flipper Zero--see common attack vectors and hacking hardware in action. Become a master at identifying threats, and get equipped with appropriate countermeasures.

Highlights include:

1) Hardware pentesting
2) Red teaming
3) Training security awareness
4) Spy gadgets
5) USB attacks
6) Wi-Fi manipulation
7) Spying on wired networks
8) Wireless connection disruption
9) RFID tag manipulation
10) Bluetooth tracking
11) Universal hacking hardware

Language:EnglishPublisher:Rheinwerk ComputingISBN-13:9781493227716ISBN-10:1493227718UPC:9781493227716Book Category:ComputersBook Subcategory:SecuritySize:10.03 x 7.01 x 1.34 inchesWeight:2.5618Product ID:SCGGGNWPV7
Scheible, Tobias: - Tobias Scheible taught and conducted research in the field of IT security at Albstadt-Sigmaringen University for more than eleven years. Since 2023, he has been a lecturer at the Institute for Continuing Education at the Baden-Württemberg Police University, where he works in the Cybercrime and Digital Traces department. There, he develops innovative training courses in the field of cybercrime and IT forensics for individuals from investigative authorities. His focus is on the implementation of target group-oriented hybrid teaching and learning arrangements. He is also involved at the European level in e-learning courses for first-time learners. In addition, he gives cybersecurity lectures and workshops as a freelance speaker. You can learn more about Tobias at https: //scheible.it.
Publisher: Rheinwerk Computing

Contributor(s)

Tobias Scheible

Free shipping on orders over $75. Standard shipping takes 3-7 business days. Returns accepted within 30 days of purchase.

Recently Viewed

View All