Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
Subjects: | |
Online Access: | Texto completo |