Cargando…

Software test attacks to break mobile and embedded devices /

Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hagar, Jon Duncan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Taylor & Francis, 2013.
Colección:Chapman & Hall/CRC Innovations in Software Engineering.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn861665546
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 131027s2013 flu ob 001 0 eng d
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d OCLCO  |d VT2  |d IDEBK  |d EBLCP  |d DEBSZ  |d CRCPR  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCF  |d OCLCQ  |d YDX  |d YDXIT  |d K6U  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 856870773  |a 894363371  |a 974304947  |a 1080585449 
020 |a 146657531X  |q (electronic bk.) 
020 |a 9781466575318  |q (electronic bk.) 
020 |a 9780429071911  |q (electronic book) 
020 |a 0429071914  |q (electronic book) 
020 |z 9781466575301  |q (pbk.) 
020 |z 1466575301  |q (pbk.) 
020 |z 1138468444 
020 |z 9781138468443 
029 1 |a AU@  |b 000067609085 
029 1 |a AU@  |b 000069011110 
029 1 |a DEBBG  |b BV042990641 
029 1 |a DEBSZ  |b 397623941 
035 |a (OCoLC)861665546  |z (OCoLC)856870773  |z (OCoLC)894363371  |z (OCoLC)974304947  |z (OCoLC)1080585449 
050 4 |a QA76.9.A25  |b H343 2013 
082 0 4 |a 005.8  |2 23 
084 |a COM051230  |a COM053000  |a MAT000000  |2 bisacsh 
049 |a UAMI 
100 1 |a Hagar, Jon Duncan. 
245 1 0 |a Software test attacks to break mobile and embedded devices /  |c Jon Duncan Hagar. 
264 1 |a Boca Raton :  |b Taylor & Francis,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Chapman & Hall/CRC Innovations in Software Engineering 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks. 
505 8 |a Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover. 
520 |a Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Penetration testing (Computer security) 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Embedded computer systems  |x Security measures. 
650 6 |a Tests d'intrusion. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 6 |a Systèmes enfouis (Informatique)  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a MATHEMATICS  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
758 |i has work:  |a Software test attacks to break mobile and embedded devices (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGPD4tfcHDdmpdgyvff3pK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hagar, Jon Duncan.  |t Software test attacks to break mobile and embedded devices.  |z 9781466575301  |z 1466575301  |w (DLC) 2013021984 
830 0 |a Chapman & Hall/CRC Innovations in Software Engineering. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1355924  |z Texto completo 
936 |a BATCHLOAD 
938 |a CRC Press  |b CRCP  |n CAH0KE21630PDF 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1355924 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis30550777 
938 |a YBP Library Services  |b YANK  |n 10690177 
938 |a YBP Library Services  |b YANK  |n 15915460 
994 |a 92  |b IZTAP