Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
Temas: | |
Acceso en línea: | Texto completo |
Sumario: | Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va. |
---|---|
Notas: | Includes index. Title from title screen. Title from book cover on Web Page (viewed September 7, 2005). |
Descripción Física: | 1 online resource (lii, 363 pages) : illustrations |
Bibliografía: | Includes bibliographical references and index. |
ISBN: | 9781932266818 193226681X 9780080488400 0080488404 |