Cargando…

Black Hat Physical Device Security: Exploiting Hardware and Software.

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Drew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Syngress Pub., 2005.
Temas:
Acceso en línea:Texto completo
Descripción
Sumario:Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.
Descripción Física:1 online resource (417 pages)
ISBN:9780080488400
0080488404
1281035912
9781281035912