Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
| Clasificación: | Libro Electrónico |
|---|---|
| Autor principal: | |
| Otros Autores: | , |
| Formato: | Electrónico eBook |
| Idioma: | Inglés |
| Publicado: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
| Temas: | |
| Acceso en línea: | Texto completo |
| Sumario: | Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va. |
|---|---|
| Notas: | Includes index. Title from title screen. Title from book cover on Web Page (viewed September 7, 2005). |
| Descripción Física: | 1 online resource (lii, 363 pages) : illustrations |
| Bibliografía: | Includes bibliographical references and index. |
| ISBN: | 9781932266818 193226681X 9780080488400 0080488404 |


