Cargando…

Black Hat Physical Device Security: Exploiting Hardware and Software.

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Drew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Syngress Pub., 2005.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn729242401
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|---|||||
008 090821s2005 xx o 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d YDXCP  |d OKU  |d IDEBK  |d OCLCQ  |d EBLCP  |d OCLCQ  |d B24X7  |d OCLCF  |d DEBSZ  |d UKDOC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d ICG  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 181421093  |a 742284889  |a 765142530  |a 815528856  |a 823108182  |a 823828885  |a 823898608  |a 824089895  |a 824136619  |a 1058137020 
020 |a 9780080488400  |q (electronic bk.) 
020 |a 0080488404  |q (electronic bk.) 
020 |a 1281035912 
020 |a 9781281035912 
020 |z 193226681X 
029 1 |a AU@  |b 000053010787 
029 1 |a DEBBG  |b BV044079484 
029 1 |a DEBSZ  |b 430283164 
035 |a (OCoLC)729242401  |z (OCoLC)181421093  |z (OCoLC)742284889  |z (OCoLC)765142530  |z (OCoLC)815528856  |z (OCoLC)823108182  |z (OCoLC)823828885  |z (OCoLC)823898608  |z (OCoLC)824089895  |z (OCoLC)824136619  |z (OCoLC)1058137020 
050 4 |a QA76.9.A25 M55 2005b 
072 7 |a UPL  |2 bicssc 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Miller, Drew. 
245 1 0 |a Black Hat Physical Device Security: Exploiting Hardware and Software. 
260 |a Rockland :  |b Syngress Pub.,  |c 2005. 
300 |a 1 online resource (417 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles. 
520 |a Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
758 |i has work:  |a Black Hat physical device security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFTgH9h7wBh4jVMhMD96jC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 1 |z 9781932266818 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=222851  |z Texto completo 
938 |a 123Library  |b 123L  |n 36435 
938 |a Books 24x7  |b B247  |n bks00004680 
938 |a EBL - Ebook Library  |b EBLB  |n EBL222851 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 103591 
938 |a YBP Library Services  |b YANK  |n 2627180 
938 |a YBP Library Services  |b YANK  |n 2730607 
994 |a 92  |b IZTAP