Black Hat physical device security : exploiting hardware and software /

Black Hat Physical Device Security provides readers with a methodology and checklist for finding common exposures, as well as real world scenarios and examples of how bypassing specific equipment can render a security system powerless. Though the exposures relate to software, the specific attacks an...

Full description

Bibliographic Details
Main Author: Miller, Drew, 1978-
Corporate Author: ScienceDirect (Online service)
Other Authors: Bednarczyk, Michael, Shein, Rob
Format: eBook
Language:English
Published: Rockland, Mass. : Syngress Pub., ©2005.
©2005
Subjects:
Online Access:Connect to the full text of this electronic book

Internet

Connect to the full text of this electronic book

Available Online

Holdings details from Available Online
Call Number: QA76.9.A25 M55 2005b
 
Call Number Status Get It
QA76.9.A25 M55 2005b Available