Black Hat Physical Device Security
暫譯: 黑帽子實體設備安全
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services
- 出版商: Syngress Media
- 出版日期: 2005-02-01
- 定價: $1,550
- 售價: 5.0 折 $775
- 語言: 英文
- 頁數: 448
- 裝訂: Hardcover
- ISBN: 193226681X
- ISBN-13: 9781932266818
-
相關分類:
Penetration-test
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
反追蹤駭客指南$390$308 -
建構嵌入式 Linux 系統$780$616 -
Google Hacks, 2/e (Paperback)$1,040$988 -
電腦鑑識與企業安全$440$348 -
駭客防護實戰系列─木馬防護全攻略$490$417 -
正規式速查手冊 (Regular Expression Pocket Reference)$200$158 -
Inside Network Perimeter Security, 2/e$1,920$1,824 -
Google Hacking for Penetration Testers, Volume 1$1,740$1,653 -
計算機組織與設計 (Computer Organization and Design: The Hardware/Software Interface, 3/e)$680$646 -
SQL 語法範例辭典$550$468 -
SQL Server 2005 Performance Tuning 效能調校$950$751 -
嵌入式系統─使用 C 和 GNU 開發工具 (Programming Embedded Systems with C and GNU Development Tools, 2/e)$680$537 -
ARM 原理與嵌入式系統實作$680$578 -
寫給 C++ 程式設計師的 UML 實務手冊$450$351 -
駭客攻防技術擂台─Vista、XP 全適用$520$442 -
網路行銷必修的 10 堂課 (How to Win Sales & Influence Spiders: Boosting Your Business & Buzz on the Web)$350$298 -
寫給 SA 的 UML/MDA 實務手冊$350$298 -
Red Hat Enterprise Linux 5 系統管理寶典(基礎篇)$690$545 -
C 語言教學手冊, 4/e$620$490 -
現代嵌入式系統開發專案實務-菜鳥成長日誌與專案經理的私房菜$600$480 -
Embedded Linux 開發實務徹底研究 (Embedded Linux Primer: A Practical Real-World Approach)$720$612 -
極意之道-ASP.NET AJAX / Silverlight 聖典$650$507 -
Microsoft SQL Server T-SQL 大全-實務學習與問題解決 (SQL Server 2005 T-SQL Recipes: A Problem-Solution Approach)$880$748 -
C# 資料庫開發經典案例解析$580$458 -
Fedora 8 Linux 全方位學習$600$474
相關主題
商品描述
Description:
Attacking & Defending Physical Devices for Software and Hardware Engineers
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions:
How can I protect against physical device exposures if I already have these systems in place?
How do I factor risk from not having a secure method of communication over a network that is not trusted
I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that?
So much of the data that I would record through monitoring can be spoofed, so why record it at all?
Can you break any embedded device with physical access?
If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices?
And many more…
Attacking & Defending Physical Devices for Software and Hardware Engineers
Identify Individuals Using Biometric Authentication Devices
Defend Monitoring, Detection, and Authentication Devices from Manipulation and Malicious Attacks
Integrate Monitoring Devices Including Streaming Video and Always-On Cameras with Active and Passive Detection Systems
商品描述(中文翻譯)
**描述:**
《攻擊與防禦物理設備:針對軟體和硬體工程師》
當今的安全設備比以往任何時候都要複雜。雖然有些設備仍然只是電子晶體管、二極體、電容器和電阻器,但許多設備現在擁有基於軟體和通信的功能。微處理器和硬碟易於使用且易於部署,廣泛應用於汽車全球定位系統(GPS)、電話,甚至便攜式遊戲系統。《黑帽物理設備安全》探討了與網路硬體、家庭安全、安全安裝公司、生物識別設備等相關的風險。本書回答了以下問題:
如果我已經有這些系統,如何保護自己免受物理設備暴露的風險?
如果我沒有安全的通信方法在不受信任的網路上,如何考量風險?
我有一個或多個工具用來測試我們製造的軟體和硬體中這類暴露的風險。我需要做更多的事情嗎?
我通過監控記錄的數據中有很多可以被偽造,那麼為什麼還要記錄它?
如果我有物理訪問權限,能否破解任何嵌入式設備?
如果我們在設備中放置高級通信過程,這是否會比僅僅將傳輸原始信號的電線插入這些設備更造成問題?
還有許多其他問題……
《攻擊與防禦物理設備:針對軟體和硬體工程師》
識別使用生物識別身份驗證設備的個體
防禦監控、檢測和身份驗證設備免受操控和惡意攻擊
整合包括串流視頻和隨時開啟的攝像頭的監控設備,與主動和被動檢測系統相結合
