The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more.
Edición: Syngress (2005)
Idioma: Inglés
Formato: PDF
Contenido:
- The Enveloping Paradigm
- Inheriting Security Problems
- Information Security
- Mitigating Exposures
- Monitoring Software Exposures
- Taking a Hard Look at Hardware
- Authenticating Hardware
- Monitoring and Detecting Deviations
- Notifying Systems
- Appendix A: Terms In Context
- Appendix B: Factoring By Quadratic Relationships: A Construction
- Appendix C: Factoring Source Code For Fun
Descarga/Download
No hay comentarios:
Publicar un comentario