|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn729242401 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
090821s2005 xx o 000 0 eng d |
040 |
|
|
|a MHW
|b eng
|e pn
|c MHW
|d YDXCP
|d OKU
|d IDEBK
|d OCLCQ
|d EBLCP
|d OCLCQ
|d B24X7
|d OCLCF
|d DEBSZ
|d UKDOC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCA
|d ICG
|d AU@
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 181421093
|a 742284889
|a 765142530
|a 815528856
|a 823108182
|a 823828885
|a 823898608
|a 824089895
|a 824136619
|a 1058137020
|
020 |
|
|
|a 9780080488400
|q (electronic bk.)
|
020 |
|
|
|a 0080488404
|q (electronic bk.)
|
020 |
|
|
|a 1281035912
|
020 |
|
|
|a 9781281035912
|
020 |
|
|
|z 193226681X
|
029 |
1 |
|
|a AU@
|b 000053010787
|
029 |
1 |
|
|a DEBBG
|b BV044079484
|
029 |
1 |
|
|a DEBSZ
|b 430283164
|
035 |
|
|
|a (OCoLC)729242401
|z (OCoLC)181421093
|z (OCoLC)742284889
|z (OCoLC)765142530
|z (OCoLC)815528856
|z (OCoLC)823108182
|z (OCoLC)823828885
|z (OCoLC)823898608
|z (OCoLC)824089895
|z (OCoLC)824136619
|z (OCoLC)1058137020
|
050 |
|
4 |
|a QA76.9.A25 M55 2005b
|
072 |
|
7 |
|a UPL
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Miller, Drew.
|
245 |
1 |
0 |
|a Black Hat Physical Device Security: Exploiting Hardware and Software.
|
260 |
|
|
|a Rockland :
|b Syngress Pub.,
|c 2005.
|
300 |
|
|
|a 1 online resource (417 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles.
|
520 |
|
|
|a Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Black Hat physical device security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFTgH9h7wBh4jVMhMD96jC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
1 |
|
|z 9781932266818
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=222851
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 36435
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00004680
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL222851
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 103591
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2627180
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2730607
|
994 |
|
|
|a 92
|b IZTAP
|