// Alternatives

Alternatives to Practical IoT Hacking

Books in our catalog with overlapping topics and a similar reading level to Practical IoT Hacking. If Practical IoT Hacking is the wrong fit at intermediate level, start here.

  1. 01 · 2021

    The Hardware Hacking Handbook

    Jasper van Woudenberg and Colin O'Flynn (NewAE / ChipWhisperer) on real hardware attacks: bus sniffing, fault injection, side-channel power analysis, and the lab work that turns a black box into a known target.

    Advanced
    5/5Jasper van Woudenberg, Colin O'Flynn
  2. 02 · 2016

    The Car Hacker's Handbook

    Craig Smith's guide to automotive bus systems (CAN, LIN, FlexRay), ECUs, infotainment surfaces, and how to fuzz, trace and exploit modern vehicles.

    Intermediate
    4/5Craig Smith
  3. 03 · 2003

    Hacking the Xbox

    Andrew "bunnie" Huang on the original Xbox: hardware modding as the entry path into reverse engineering, plus a frank account of the legal fight that followed.

    Intermediate
    4/5Andrew "bunnie" Huang
  4. 04 · 2018

    Click Here to Kill Everybody

    Bruce Schneier's policy-level argument that as everything becomes a computer (cars, medical devices, infrastructure, voting), the security failures that used to merely cost us money will start costing lives — and the regulatory shape of that future is being decided now.

    Beginner
    4/5Bruce Schneier
  5. 05 · 2024

    Extreme Privacy

    Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.

    Intermediate
    5/5Michael Bazzell
  6. 06 · 2024

    OSINT Techniques

    Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.

    Intermediate
    5/5Michael Bazzell
  7. 07 · 2024

    Serious Cryptography

    Jean-Philippe Aumasson's working introduction to modern cryptography, written for engineers who need both intuition and enough mathematical depth to evaluate the choices a library is making for them.

    Intermediate
    5/5Jean-Philippe Aumasson
  8. 08 · 2021

    Designing Secure Software

    Loren Kohnfelder, the original PKI author, on how to weave security thinking through requirements, design, implementation and operations rather than bolt it on at the end.

    Intermediate
    5/5Loren Kohnfelder
  9. 09 · 2021

    Real-World Cryptography

    David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.

    Intermediate
    5/5David Wong
  10. 10 · 2014

    Threat Modeling

    Adam Shostack's practitioner-oriented introduction to threat modeling: STRIDE, attack trees, and how to fit the practice into a real software-development lifecycle.

    Intermediate
    5/5Adam Shostack
Back to Practical IoT HackingWhat to read after Practical IoT Hacking