Hacking connected cars: tactics, techniques, and procedures (Record no. 1725)

MARC details
000 -LEADER
fixed length control field 02838nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250801123701.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250801b2020|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119491781
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.717
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Knight, Alissa
Relator term Author
245 ## - TITLE STATEMENT
Title Hacking connected cars: tactics, techniques, and procedures
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxxiii, 238p.
500 ## - GENERAL NOTE
General note A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment<br/><br/>Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.<br/><br/>Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle’s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.<br/><br/>Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide<br/>Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability<br/>Conduct penetration testing using the same tactics, techniques, and procedures used by hackers<br/>From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars—all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Intelligence Gathering
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Threat Modeling and Vulnerability Analysis
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Risk‐Assessment Frameworks
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820810
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.717 EB0149 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha