Cargando…

Black Hat physical device security : exploiting hardware and software /

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miller, Drew, 1978-
Otros Autores: Bednarczyk, Michael, Shein, Rob
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress Pub., �2005.
�2005
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm61447472
003 OCoLC
005 20231117015036.0
006 m o d
007 cr nn|||||||||
008 050907s2005 maua ob 001 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d OKU  |d OCLCQ  |d REDDC  |d OCLCQ  |d MERUC  |d CCO  |d HVC  |d E7B  |d U5D  |d OCLCO  |d OCLCQ  |d OCLCF  |d DKDLA  |d OCLCQ  |d OPELS  |d CSU  |d UMI  |d OCLCQ  |d COO  |d OCL  |d KSU  |d AZK  |d LOA  |d DEBBG  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d BRL  |d WRM  |d D6H  |d CEF  |d NRAMU  |d EZ9  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d A6Q  |d OCLCQ  |d LEAUB  |d OL$  |d UKCRE  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 70755791  |a 162599290  |a 475416616  |a 559610130  |a 606028767  |a 646729137  |a 722339298  |a 740948748  |a 856952160  |a 933930937  |a 961652175  |a 962688853  |a 966225817  |a 988463615  |a 991909781  |a 1035655430  |a 1037527517  |a 1037724587  |a 1038671039  |a 1045489340  |a 1047549128  |a 1055358042  |a 1076306684  |a 1081284475  |a 1153512747  |a 1228610352 
020 |a 9781932266818 
020 |a 193226681X 
020 |a 9780080488400 
020 |a 0080488404 
020 |z 193226681X 
035 |a (OCoLC)61447472  |z (OCoLC)70755791  |z (OCoLC)162599290  |z (OCoLC)475416616  |z (OCoLC)559610130  |z (OCoLC)606028767  |z (OCoLC)646729137  |z (OCoLC)722339298  |z (OCoLC)740948748  |z (OCoLC)856952160  |z (OCoLC)933930937  |z (OCoLC)961652175  |z (OCoLC)962688853  |z (OCoLC)966225817  |z (OCoLC)988463615  |z (OCoLC)991909781  |z (OCoLC)1035655430  |z (OCoLC)1037527517  |z (OCoLC)1037724587  |z (OCoLC)1038671039  |z (OCoLC)1045489340  |z (OCoLC)1047549128  |z (OCoLC)1055358042  |z (OCoLC)1076306684  |z (OCoLC)1081284475  |z (OCoLC)1153512747  |z (OCoLC)1228610352 
050 4 |a QA76.9.A25  |b M55 2005b 
082 0 4 |a 005.8  |2 22 
100 1 |a Miller, Drew,  |d 1978- 
245 1 0 |a Black Hat physical device security :  |b exploiting hardware and software /  |c Drew Miller, Michael Bednarczyk ; technical reviewer, Rob Shein. 
260 |a Rockland, Mass. :  |b Syngress Pub.,  |c �2005. 
264 4 |c �2005 
300 |a 1 online resource (lii, 363 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a Includes index. 
500 |a Title from title screen. 
500 |a Title from book cover on Web Page (viewed September 7, 2005). 
550 |a May be limited to subscribing institutions. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles. 
520 |a Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va. 
650 0 |a Computer security. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Bednarczyk, Michael. 
700 1 |a Shein, Rob. 
776 0 8 |i Print version:  |a Miller, Drew, 1978-  |t Black Hat physical device security.  |b 1st ed.  |d Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly in the United States and Canada, 2005  |z 193226681X  |z 9781932266818  |w (OCoLC)58482495 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781932266818  |z Texto completo