Amazon cover image
Image from Amazon.com

Black Hat physical device security : exploiting hardware and software / Drew Miller, Michael Bednarczyk ; technical reviewer, Rob Shein.

By: Contributor(s): ©2005Description: 1 online resource (lii, 363 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781932266818
  • 193226681X
  • 9780080488400
  • 0080488404
Subject(s): Genre/Form: Additional physical formats: Print version:: Black Hat physical device security.LOC classification:
  • QA76.9.A25 M55 2005b
Online resources:
Contents:
Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles.
Summary: Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes index.

Title from title screen.

Title from book cover on Web Page (viewed Sept. 7, 2005).

May be limited to subscribing institutions.

Includes bibliographical references and index.

Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles.

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.

Safari Books Online Safari Tech Books Online

Elsevier ScienceDirect All Books

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu