There are no two people who share the same experiences or backgrounds. However, since IoT devices combine computational power and connection in every aspect of our society, studying them requires skills spanning almost every subject of knowledge. Each person's favorite passages in this book are impossible to predict. However, we think that having this information accessible to a large portion of the population will give them the power to exert more influence over the increasingly digital environment they live in. ” Practical IoT Hacking “.
Although we expect that it will be useful to others as well, such as the following people, this book was initially written for hackers (sometimes called security researchers).
- A security researcher might use this book as a reference for experimenting with an IoT ecosystem’s unfamiliar protocols, data structures, components, and concepts.
- An enterprise sysadmin or network engineer might learn how to better protect their environment and their organization’s assets.
- A product manager for an IoT device might discover new requirements their customers will assume are already present and build them in, reducing cost and the time it takes the product to reach the market.
- A security assessor might discover a new set of skills to better serve their clients.
- A curious student might find knowledge that will catapult them into a rewarding career protecting people.
This book was written with the assumption that the reader is already somewhat acquainted with Linux command line fundamentals, TCP/IP networking ideas, and coding.