Awesome IoT Security Resources
From Day Zero to Zero Day
2025-08-12
Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited.
Blue Fox: Arm Assembly Internals and Reverse Engineering
2023-04-11
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices.
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
2021-12-21
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.
The Fuzzing Book: Tools and Techniques for Generating Software Tests
2019-05-30
Software has bugs, and catching bugs can involve lots of effort. This book addresses this problem by automating software testing, specifically by generating tests automatically. Recent years have seen the development of novel techniques that lead to dramatic improvements in test generation and software testing. They now are mature enough to be assembled in a book - even with executable code.
Reverse Engineering for Beginners
2015-10-30
Offers a primer on reverse-engineering, delving into 'disassembly'-code-level reverse engineering and explaining how to decipher assembly language for those beginners who would like to learn to understand x86 (which accounts for almost all executable software in the world) and ARM code created by C/C++ compilers. It covers x86/x64, ARM/ARM64, MIPS, Java/JVM.
Secure Coding in C and C++ (2nd Edition)
2013-04-11
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them
This book identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow's attacks, not just today's.
Fuzzing: Brute Force Vulnerability Discovery
2007-06-29
Provides information on using fuzzing to detect weaknesses in software.
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
2006-01-01
The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.
Hacking the Xbox: An Introduction to Reverse Engineering
2003-06-01
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.