Black Hat physical device security : exploiting hardware and software /
Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...
| Main Author: | |
|---|---|
| Corporate Author: | |
| Other Authors: | , |
| Format: | eBook |
| Language: | English |
| Published: |
Rockland, Mass. :
Syngress Pub.,
©2005.
©2005 |
| Subjects: | |
| Online Access: | Connect to the full text of this electronic book |
Internet
Connect to the full text of this electronic bookAvailable Online
| Call Number: |
QA76.9.A25 M55 2005b |
|
|---|---|---|
| Call Number | Status | Get It |
| QA76.9.A25 M55 2005b | Available | |