Loading…

Black Hat physical device security : exploiting hardware and software /

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Miller, Drew, 1978-
Other Authors: Bednarczyk, Michael, Shein, Rob
Format: Electronic eBook
Language:Inglés
Published: Rockland, Mass. : Syngress Pub., �2005.
�2005
Subjects:
Online Access:Texto completo

Similar Items