Black Hat Physical Device Security

Black Hat Physical Device Security

Drew Miller
كم أعجبك هذا الكتاب؟
ما هي جودة الملف الذي تم تنزيله؟
قم بتنزيل الكتاب لتقييم الجودة
ما هي جودة الملفات التي تم تنزيلها؟
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isn't that creating more problems then simply plugging wires that carry raw signals into these devices?
الفئات:
عام:
2004
الإصدار:
1
الناشر:
Syngress
اللغة:
english
الصفحات:
417
ISBN 10:
193226681X
ISBN 13:
9781932266818
ملف:
PDF, 78.59 MB
IPFS:
CID , CID Blake2b
english, 2004
إقرأ علي الإنترنت
جاري التحويل إلى
التحويل إلى باء بالفشل

أكثر المصطلحات والعبارات المستخدمة