Cargando…

Black Hat physical device security : exploiting hardware and software /

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Drew, 1978-
Otros Autores: Bednarczyk, Michael, Shein, Rob
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress Pub., �2005.
�2005
Temas:
Acceso en línea:Texto completo
Descripción
Sumario:Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.
Notas:Includes index.
Title from title screen.
Title from book cover on Web Page (viewed September 7, 2005).
Descripción Física:1 online resource (lii, 363 pages) : illustrations
Bibliografía:Includes bibliographical references and index.
ISBN:9781932266818
193226681X
9780080488400
0080488404