Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Why you need this bookRansomware gangs no longer target just corporations. A hijacked baby cam, a bricked thermostat, or a demand for Bitcoin to turn your lights back on can hit any household. Veteran penetration tester Jasper Lowe shows you how to out-engineer criminals with consumer hardware and open-source software - no computer-science degree required.
What you'll master
ISP-independent defence - cache DNS, mirror firmware, and keep Home Assistant running when the internet-or the attacker-pulls the plug. DIY hardware firewall - flash inexpensive single-board routers with OpenWRT, write tight iptables rules, and add automatic IP-block-list feeds. "Guest-IoT-Work" network slicing - VLANs, MAC whitelists, and WPA3 keys that quarantine every smart bulb without throttling your Zoom calls. Ransomware kill-switch backups - air-gapped snapshots, immutable ZFS datasets, and a Raspberry Pi that boots an emergency media server. Offline voice & automation - swap cloud skill servers for open-source alternatives so Alexa-style convenience survives an outage. Rapid incident response - three-command triage to freeze traffic, trace the breach, and re-flash compromised gadgets in under an hour.
Real-world walkthroughs include: blocking Mirai clones on a TP-Link router, converting an old laptop into a Security Onion sensor, and building a Faraday-cage charging locker for guests' devices.
About the authorJasper Lowe has broken into Fortune-500 networks (legally) for fifteen years, teaches blue-team tactics at DEF CON's Blue Village, and runs the popular "Home Lab Ops" YouTube channel.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Why you need this bookRansomware gangs no longer target just corporations. A hijacked baby cam, a bricked thermostat, or a demand for Bitcoin to turn your lights back on can hit any household. Veteran penetration tester Jasper Lowe shows you how to out-engineer criminals with consumer hardware and open-source software - no computer-science degree required.
What you'll master
ISP-independent defence - cache DNS, mirror firmware, and keep Home Assistant running when the internet-or the attacker-pulls the plug. DIY hardware firewall - flash inexpensive single-board routers with OpenWRT, write tight iptables rules, and add automatic IP-block-list feeds. "Guest-IoT-Work" network slicing - VLANs, MAC whitelists, and WPA3 keys that quarantine every smart bulb without throttling your Zoom calls. Ransomware kill-switch backups - air-gapped snapshots, immutable ZFS datasets, and a Raspberry Pi that boots an emergency media server. Offline voice & automation - swap cloud skill servers for open-source alternatives so Alexa-style convenience survives an outage. Rapid incident response - three-command triage to freeze traffic, trace the breach, and re-flash compromised gadgets in under an hour.
Real-world walkthroughs include: blocking Mirai clones on a TP-Link router, converting an old laptop into a Security Onion sensor, and building a Faraday-cage charging locker for guests' devices.
About the authorJasper Lowe has broken into Fortune-500 networks (legally) for fifteen years, teaches blue-team tactics at DEF CON's Blue Village, and runs the popular "Home Lab Ops" YouTube channel.