Loading…

Black Hat physical device security : exploiting hardware and software /

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Miller, Drew, 1978-
Other Authors: Bednarczyk, Michael, Shein, Rob
Format: Electronic eBook
Language:Inglés
Published: Rockland, Mass. : Syngress Pub., �2005.
�2005
Subjects:
Online Access:Texto completo
Table of Contents:
  • Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles.