Seven deadliest USB attacks /
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. Y...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Anderson, Brian (Brian James) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress,
�2010.
|
Colección: | Syngress seven deadliest attacks series.
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Security and resilience in intelligent data-centric systems and communication networks /
Publicado: (2018) -
Data breach preparation and response : breaches are certain, impact is not /
por: Fowler, Kevvie
Publicado: (2016) -
Information security best practices : 205 basic rules /
por: Stefanek, George L.
Publicado: (2002) -
Hack proofing Windows 2000 /
por: Todd, Chad
Publicado: (2001) -
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Publicado: (2006)