{"id":103,"date":"2016-07-17T23:15:04","date_gmt":"2016-07-17T23:15:04","guid":{"rendered":"http:\/\/www.samuelhuntley.com\/?p=103"},"modified":"2016-11-03T02:53:12","modified_gmt":"2016-11-03T02:53:12","slug":"embedded-device-security-pwn-real-time-operating-systems","status":"publish","type":"post","link":"https:\/\/www.samuelhuntley.com\/?p=103","title":{"rendered":"Embedded Device Security: Pwn Real Time Operating Systems"},"content":{"rendered":"<p>This book introduces the reader to wonderful world of embedded device hacking and real time operating systems. This book is written for hackers, hobbyists, developers, system programmers as well as penetration testers to understand how someone would go about trying to analyze and assess the security of an embedded device running a real time operating system. The book is supposed to be a tutorial guide for readers. So sit back, relax and enjoy the read!!<\/p>\n<p><a href=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-104\" src=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded3-219x300.png\" alt=\"embedded3\" width=\"219\" height=\"300\" srcset=\"https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded3-219x300.png 219w, https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/embedded3.png 272w\" sizes=\"(max-width: 219px) 100vw, 219px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.amazon.com\/Embedded-Device-Security-Operating-Systems\/dp\/1517782589\/ref=sr_1_4\/000-9701188-2690166?s=books&amp;ie=UTF8&amp;qid=1468796266&amp;sr=1-4&amp;refinements=p_27%3AMr+Samuel+Huntley\">Buy it at Amazon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This book introduces the reader to wonderful world of embedded device hacking and real time operating systems. This book is written for hackers, hobbyists, developers, system programmers as well as penetration testers to understand how someone would go about trying to analyze and assess the security of an embedded device running a real time operating &hellip; <a href=\"https:\/\/www.samuelhuntley.com\/?p=103\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Embedded Device Security: Pwn Real Time Operating Systems<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/103"}],"collection":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=103"}],"version-history":[{"count":1,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/103\/revisions"}],"predecessor-version":[{"id":105,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/103\/revisions\/105"}],"wp:attachment":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}