Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Miller, Drew, 1978- |
Otros Autores: | Bednarczyk, Michael, Shein, Rob |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Hardware security : a hands-on learning approach /
por: Bhunia, Swarup, et al.
Publicado: (2019) -
Security Controls Evaluation, Testing, and Assessment Handbook.
por: Johnson, Leighton
Publicado: (2019) -
System assurance : beyond detecting vulnerabilities /
por: Mansourov, Nikolai
Publicado: (2010) -
Emerging cyber threats and cognitive vulnerabilities /
Publicado: (2020) -
Information security best practices : 205 basic rules /
por: Stefanek, George L.
Publicado: (2002)