CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Software test attacks to break mobile and embedded devices / (Record no. 15790)

MARC details
000 -LEADER
fixed length control field 02062nam a2200373Ii 4500
001 - CONTROL NUMBER
control field CAH0KE21630PDF
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171224123812.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150323s2014 flua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466575318 (ebook : PDF)
040 ## - CATALOGING SOURCE
Original cataloging agency FlBoTFG
Language of cataloging eng
Transcribing agency FlBoTFG
Description conventions rda
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9.A25
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) H343 2014
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 005.8
Item number H141
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hagar, Jon Duncan,
Relator term author.
245 10 - TITLE STATEMENT
Title Software test attacks to break mobile and embedded devices /
Statement of responsibility, etc Jon Duncan Hagar.
264 #1 -
-- Boca Raton :
-- CRC Press,
-- [2014]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details text file, PDF
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
490 1# - SERIES STATEMENT
Series statement Chapman & Hall/CRC innovations in software engineering and software development
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note chapter 1. Setting the mobile and embedded framework -- chapter 2. Developer attacks : taking the code head on -- chapter 3. Control system attacks -- chapter 4. Hardware software attacks -- chapter 5. Mobile and embedded software attacks -- chapter 6. Time attacks : "it's about time" -- chapter 7. Human user interface attacks : "the limited (and unlimited) user interface" -- chapter 8. Smart and/or mobile phone attacks -- chapter 9. Mobile/embedded security -- chapter 10. Generic attacks -- chapter 11. Mobile and embedded system labs -- chapter 12. Some parting advice.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print format.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile computing
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Embedded computer systems
General subdivision Security measures.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcsh
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
International Standard Book Number 9781466575301
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Chapman & Hall/CRC innovations in software engineering and software development.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://marc.crcnetbase.com/isbn/9781466575318">http://marc.crcnetbase.com/isbn/9781466575318</a>
Electronic format type application/PDF
Public note Distributed by publisher. Purchase or institutional license may be required for access.

No items available.


Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh