Secure your system against hardware-based attacks!

Hardware Security The Practical Guide to Penetration Testing and Prevention

written by
approx. $64.99

Pre-order now

approx. $69.95

Pre-order now

approx. $79.99

Pre-order now

Print edition E-book Bundle
600 pages, , Print edition paperback
ISBN 978-1-4932-2771-6
600 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2772-3
600 pages, , Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2773-0
Defend your system against hardware-based security breaches by thinking like a hacker! With this guide, master the tools you need to develop preventative IT security tests and measures. Learn how to perform penetration tests step by step, and then evaluate and correct vulnerabilities. Get up to speed on awareness training methods and hacking tools for protecting your hardware. From USB killers and keyloggers to manipulated Wi-Fi connections and beyond, understand real-world attack scenarios and—most importantly—how to prevent them!
  • Understand hardware vulnerabilities and attack vectors
  • Work with pentesting hardware to improve security for USBs, Bluetooth, Wi-Fi, RFID, LAN, and more
  • Develop training mechanisms and testing procedures to reduce the risk of attacks via external devices
About the E-book About the Book E-book in full color. PDF (11 MB) and EPUB (14 MB) files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application. 600 pages, paperback. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout.

In this book, you’ll learn about:

  1. Penetration Testing and Red Teaming

    Where are the vulnerabilities in your infrastructure? How does an attacker see your environment, and what tools do they use? You’ll discover that the best attack tools often look simple, yet still cause significant damage.

  2. Security Awareness Training

    The best virus scanners and firewalls are useless if your team doesn’t take the necessary precautions. Learn how to conduct effective awareness training to educate your colleagues about the dangers posed by inconspicuous hardware.

  3. Hacking Hardware

    Rubber Ducky, USBKill, HackRF One, Flipper Zero—see common attack vectors and hacking hardware in action. Become a master at identifying threats, and get equipped with appropriate countermeasures.

Highlights include:

  • Hardware pentesting
  • Red teaming
  • Training security awareness
  • Spy gadgets
  • USB attacks
  • Wi-Fi manipulation
  • Spying on wired networks
  • Wireless connection disruption
  • RFID tag manipulation
  • Bluetooth tracking
  • Universal hacking hardware

Tobias Scheible is a computer scientist and research associate at Albstadt-Sigmaringen University of Applied Sciences, where he works as a lecturer in the university certificate program at the Institute for Continuing Education and teaches part-time modules about network security, internet technologies, and IT forensics.

more >

You may also like:

  • Cover of Swift

    Swift
    The Practical Guide

    Kerem Koseoglu

    680 pages, paperback

    This is your ultimate resource for Swift, the programming language for Apple devices! Get to know Swift’s syntax and learn to work with elements such as variables and collections. Use Swift’s built-in features for debugging, error handling, and memory management More about the book

    approx. $54.99

    Pre-order now
    Available on 12/18/2025

    E-book | Print edition | Bundle
  • Cover of Applied Machine Learning

    Applied Machine Learning

    Jason Hodson

    450 pages, paperback

    Put machine learning theory into practice with this hands-on guide! Learn about the real-world application of machine learning models by following three use cases, each with its own dataset. Get started with tools like GitHub and Anaconda, and then follow More about the book

    approx. $54.99

    Pre-order now
    Available on 02/25/2026

    E-book | Print edition | Bundle
  • Cover of Warehouse Management with SAP S/4HANA

    Warehouse Management with SAP S/4HANA
    Embedded and Decentralized EWM

    Namita Sachan, Aman Jain

    1001 pages, hardcover

    Are you ready for warehouse management with SAP S/4HANA? With this implementation guide to EWM in SAP S/4HANA, start by setting up organizational and warehouse structures. Then follow step-by-step instructions to configure your product master, warehouse requests, handling units, warehouse More about the book

    from $94.99

    Available

    E-book | Print edition | Bundle