Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
Call Number: | Libro Electrónico |
---|---|
Main Author: | Miller, Drew, 1978- |
Other Authors: | Bednarczyk, Michael, Shein, Rob |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, Mass. :
Syngress Pub.,
�2005.
�2005 |
Subjects: | |
Online Access: | Texto completo |
Similar Items
-
Hardware security : a hands-on learning approach /
by: Bhunia, Swarup, et al.
Published: (2019) -
Security Controls Evaluation, Testing, and Assessment Handbook.
by: Johnson, Leighton
Published: (2019) -
System assurance : beyond detecting vulnerabilities /
by: Mansourov, Nikolai
Published: (2010) -
Emerging cyber threats and cognitive vulnerabilities /
Published: (2020) -
Information security best practices : 205 basic rules /
by: Stefanek, George L.
Published: (2002)