domingo, 18 de noviembre de 2007

Black Hat Physical Device Security: Exploiting Hardware and Software

The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more.

Edición: Syngress (2005)
Idioma: Inglés
Formato: PDF

Contenido:

  1. The Enveloping Paradigm
  2. Inheriting Security Problems
  3. Information Security
  4. Mitigating Exposures
  5. Monitoring Software Exposures
  6. Taking a Hard Look at Hardware
  7. Authenticating Hardware
  8. Monitoring and Detecting Deviations
  9. Notifying Systems
  10. Appendix A: Terms In Context
  11. Appendix B: Factoring By Quadratic Relationships: A Construction
  12. Appendix C: Factoring Source Code For Fun

Descarga/Download

No hay comentarios: