Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Attacking and Defending Physical Devices for Software and Hardware Engineers
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Attacking and Defending Physical Devices for Software and Hardware Engineers

Attacking and Defending Physical Devices for Software and Hardware Engineers

Exploiting Hardware and Software

Drew Miller

410 pages, parution le 04/04/2005

Résumé

Attacking & Defending Physical Devices for Software and Hardware Engineers

The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions:

  • How can I protect against physical device exposures if I already have these systems in place?
  • How do I factor risk from not having a secure method of communication over a network that is not trusted
  • I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that?
  • So much of the data that I would record through monitoring can be spoofed, so why record it at all?
  • Can you break any embedded device with physical access?
  • If we place high-level communication processes within our devices, isn't that creating more problems then simply plugging wires that carry raw signals into these devices?
  • And many more...

Attacking & Defending Physical Devices for Software and Hardware Engineers

  • Identify Individuals Using Biometric Authentication Devices
  • Defend Monitoring, Detection, and Authentication Devices from Manipulation and Malicious Attacks
  • Integrate Monitoring Devices Including Streaming Video and Always-On Cameras with Active and Passive Detection Systems

Sommaire

  • The Enveloping Paradigm
  • Inheriting Security Problems
  • Information Security
  • Mitigating Exposures
  • Monitoring Software Exposures
  • Taking a Hard Look at Hardware
  • Authenticating People
  • Monitoring and Detecting Deviations
  • Notifying Systems
  • Appendix A Terms In Context
  • Appendix B Factoring By Quadratic Relationships: A Construction
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Drew Miller
Parution 04/04/2005
Nb. de pages 410
Format 18 x 23
Couverture Broché
Poids 660g
Intérieur Noir et Blanc
EAN13 9781932266818
ISBN13 978-1-932266-81-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription