Black Hat physical device security : exploiting hardware and software / Drew Miller, Michael Bednarczyk ; technical reviewer, Rob Shein.
©2005Description: 1 online resource (lii, 363 pages) : illustrationsContent type:- text
- computer
- online resource
- 9781932266818
- 193226681X
- 9780080488400
- 0080488404
- QA76.9.A25 M55 2005b

Includes index.
Title from title screen.
Title from book cover on Web Page (viewed Sept. 7, 2005).
May be limited to subscribing institutions.
Includes bibliographical references and index.
Cover; Contents; Foreword; Introduction; The Enveloping Paradigm; Inheriting Security Problems; Information Security; Mitigating Exposures; Monitoring Software Exposures; Taking a Hard Look at Hardware; Authenticating People; Monitoring and Detecting Deviations; Notifying Systems; Terms In Context; Factoring By Quadratic Relationships: A Construction; Factoring Source Code For Fun; Index; Related Titles.
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks and methods used to assess a given hardware device will be shown. For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS), however the method of deployment and success va.
Safari Books Online Safari Tech Books Online
Elsevier ScienceDirect All Books