Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | SCIDIR_ocm61447472 | ||
003 | OCoLC | ||
005 | 20231117015036.0 | ||
006 | m o d | ||
007 | cr nn||||||||| | ||
008 | 050907s2005 maua ob 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d OKU |d OCLCQ |d REDDC |d OCLCQ |d MERUC |d CCO |d HVC |d E7B |d U5D |d OCLCO |d OCLCQ |d OCLCF |d DKDLA |d OCLCQ |d OPELS |d CSU |d UMI |d OCLCQ |d COO |d OCL |d KSU |d AZK |d LOA |d DEBBG |d COCUF |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d U3W |d OCLCA |d STF |d BRL |d WRM |d D6H |d CEF |d NRAMU |d EZ9 |d OCLCQ |d INT |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d LEAUB |d OL$ |d UKCRE |d OCLCQ |d OCLCO |d COM |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 70755791 |a 162599290 |a 475416616 |a 559610130 |a 606028767 |a 646729137 |a 722339298 |a 740948748 |a 856952160 |a 933930937 |a 961652175 |a 962688853 |a 966225817 |a 988463615 |a 991909781 |a 1035655430 |a 1037527517 |a 1037724587 |a 1038671039 |a 1045489340 |a 1047549128 |a 1055358042 |a 1076306684 |a 1081284475 |a 1153512747 |a 1228610352 | ||
020 | |a 9781932266818 | ||
020 | |a 193226681X | ||
020 | |a 9780080488400 | ||
020 | |a 0080488404 | ||
020 | |z 193226681X | ||
035 | |a (OCoLC)61447472 |z (OCoLC)70755791 |z (OCoLC)162599290 |z (OCoLC)475416616 |z (OCoLC)559610130 |z (OCoLC)606028767 |z (OCoLC)646729137 |z (OCoLC)722339298 |z (OCoLC)740948748 |z (OCoLC)856952160 |z (OCoLC)933930937 |z (OCoLC)961652175 |z (OCoLC)962688853 |z (OCoLC)966225817 |z (OCoLC)988463615 |z (OCoLC)991909781 |z (OCoLC)1035655430 |z (OCoLC)1037527517 |z (OCoLC)1037724587 |z (OCoLC)1038671039 |z (OCoLC)1045489340 |z (OCoLC)1047549128 |z (OCoLC)1055358042 |z (OCoLC)1076306684 |z (OCoLC)1081284475 |z (OCoLC)1153512747 |z (OCoLC)1228610352 | ||
050 | 4 | |a QA76.9.A25 |b M55 2005b | |
082 | 0 | 4 | |a 005.8 |2 22 |
100 | 1 | |a Miller, Drew, |d 1978- | |
245 | 1 | 0 | |a Black Hat physical device security : |b exploiting hardware and software / |c Drew Miller, Michael Bednarczyk ; technical reviewer, Rob Shein. |
260 | |a Rockland, Mass. : |b Syngress Pub., |c �2005. | ||
264 | 4 | |c �2005 | |
300 | |a 1 online resource (lii, 363 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Includes index. | ||
500 | |a Title from title screen. | ||
500 | |a Title from book cover on Web Page (viewed September 7, 2005). | ||
550 | |a May be limited to subscribing institutions. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles. | |
520 | |a Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va. | ||
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 (DNLM)D016494 | |
650 | 6 | |a S�ecurit�e informatique. |0 (CaQQLa)201-0061152 | |
650 | 7 | |a Computer security |2 fast |0 (OCoLC)fst00872484 | |
700 | 1 | |a Bednarczyk, Michael. | |
700 | 1 | |a Shein, Rob. | |
776 | 0 | 8 | |i Print version: |a Miller, Drew, 1978- |t Black Hat physical device security. |b 1st ed. |d Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly in the United States and Canada, 2005 |z 193226681X |z 9781932266818 |w (OCoLC)58482495 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9781932266818 |z Texto completo |