{"product_id":"woudenberg-jasper-van-the-hardware-hacking-handbook","title":"The Hardware Hacking Handbook","description":"\u003cp\u003eBreaking Embedded Security with Hardware Attacks\u003c\/p\u003e\u003ctable style=\"border-collapse: collapse; border: none;\"\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eEAN:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e9781593278748\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eFarbverschnitt:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eGenerell werden die Bücher ohne Farbverschnitt geliefert, auch wenn die Abbildungen einen Farbverschnitt zeigen.\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eErscheinungsjahr:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e21.12.2021\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eProduktform:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eKartoniert\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eAutoren:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eWoudenberg, Jasper van \u0026amp; O'Flynn, Colin\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eThemenüberschrift:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eCOMPUTERS \/ Embedded Computer Systems\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eKeyword:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003etech gifts;gift books;gifts for nerds;geek gifts;nerd gifts for men;pentest;hacking books;gifts for geeks;computer security;hacking the art of exploitation;ethical hacking;hacking book;hardware hacking;embedded systems;networking;security;hacking;technology;computer;computers;privacy;hackers;cybersecurity;tech;network;cyber security;cloud computing;computer networking;penetration testing;computer networks;network security;computer books;cyber security books;penetration test;programming\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eFachschema:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eBetriebssystem (EDV)~Operating System~Chemie \/ Technik, Werkstoffe, Berufe, Industrie~Computer \/ PC-Hardware~Englische Bücher \/ Naturwissenschaften~Fertigungstechnik~Embedded System~Mikrocontroller~Datensicherheit \/ Netz~Datensicherheit~Datensicherung~Sicherheit \/ Datensicherheit~Hacker (EDV)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eFachkategorie:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eBetriebssysteme~Industrielle Chemie und Fertigungstechnologien~Computerprogrammierung und Softwareentwicklung~Eingebettete Systeme~Netzwerksicherheit~Fertigungsindustrie~Computerkriminalität, Hacking~Vernetzte âsmarteâ Technologien, Elektronik\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eImprint-Titels:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eNo Starch Press\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eText Sprache:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eeng\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eSeitenanzahl:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eXXVIII, 479\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eVerlag:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eRandom House LLC US\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eLänge:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e234 mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eBreite:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e177 mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eHöhe:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e30 mm\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eGewicht:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003e996 gr\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eGenre:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eImporte\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"border: none;\"\u003e\n\u003ctd style=\"border: none; width: 30%;\"\u003eHerkunftsland:\u003c\/td\u003e\n\u003ctd style=\"border: none;\"\u003eVEREINIGTE STAATEN VON AMERIKA (US)\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/table\u003e","brand":"Woudenberg, Jasper van \u0026 O'Flynn, Colin","offers":[{"title":"Default Title","offer_id":50665574924614,"sku":"1231154","price":36.93,"currency_code":"EUR","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0852\/3081\/3510\/files\/B00000014240642.jpg?v=1763893632","url":"https:\/\/www.averdo.com\/products\/woudenberg-jasper-van-the-hardware-hacking-handbook","provider":"Averdo","version":"1.0","type":"link"}