Description |
1 online resource (1 volume) : illustrations |
Bibliography |
Includes bibliographical references and index. |
Summary |
If you're curious about automotive security and have the urge to hack a two-ton computer, this detailed resource will give you a deeper understanding of the computer systems and embedded software in modern vehicles. -- Edited summary from book. |
Contents |
Policies and guidelines -- Threat modeling -- Vehicle communications -- Utilizing the Linux SocketCAN interface -- Diagnostic communications -- CAN Bus RE -- ECU hacking -- ECU test benches -- Infotainment systems -- Vehicle to vehicle -- Weaponizing -- TPMS -- Keysystems -- Hotwiring -- Embedded system attack -- Performance tuning. |
Subject |
Automotive computers -- Security measures -- Handbooks, manuals, etc.
|
|
Automobiles -- Performance -- Handbooks, manuals, etc.
|
|
Automobiles -- Customizing -- Handbooks, manuals, etc.
|
|
Penetration testing (Computer security) -- Handbooks, manuals, etc.
|
|
Ordinateurs de bord -- Sécurité -- Mesures -- Guides, manuels, etc. |
|
Automobiles -- Performances -- Guides, manuels, etc. |
|
Automobiles -- Adaptation aux besoins -- Guides, manuels, etc. |
|
Tests d'intrusion -- Guides, manuels, etc. |
|
Automobiles -- Customizing |
|
Automobiles -- Performance |
|
Penetration testing (Computer security) |
Genre |
handbooks.
|
|
Handbooks and manuals
|
|
Handbooks and manuals.
|
|
Guides et manuels.
|
Other Form: |
Print version: 9781593277031 1593277032 (DLC) 2015038297 (OCoLC)919482423 |
ISBN |
9781593277703 (electronic bk.) |
|
1593277709 (electronic bk.) |
|
1593277032 (electronic bk.) |
|
9781593277031 (electronic bk.) |
|
9781457198847 (electronic bk.) |
|
1457198843 (electronic bk.) |
|