CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Software test attacks to break mobile and embedded devices / Jon Duncan Hagar.

By: Hagar, Jon Duncan [author.].
Material type: materialTypeLabelBookSeries: Chapman & Hall/CRC innovations in software engineering and software development: Publisher: Boca Raton : CRC Press, [2014]Description: 1 online resource : text file, PDF.Content type: text Media type: computer Carrier type: online resourceISBN: 9781466575318 (ebook : PDF).Subject(s): Penetration testing (Computer security) | Mobile computing -- Security measures | Embedded computer systems -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: No titleOnline resources: Distributed by publisher. Purchase or institutional license may be required for access. Also available in print format.
Contents:
chapter 1. Setting the mobile and embedded framework -- chapter 2. Developer attacks : taking the code head on -- chapter 3. Control system attacks -- chapter 4. Hardware software attacks -- chapter 5. Mobile and embedded software attacks -- chapter 6. Time attacks : "it's about time" -- chapter 7. Human user interface attacks : "the limited (and unlimited) user interface" -- chapter 8. Smart and/or mobile phone attacks -- chapter 9. Mobile/embedded security -- chapter 10. Generic attacks -- chapter 11. Mobile and embedded system labs -- chapter 12. Some parting advice.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

chapter 1. Setting the mobile and embedded framework -- chapter 2. Developer attacks : taking the code head on -- chapter 3. Control system attacks -- chapter 4. Hardware software attacks -- chapter 5. Mobile and embedded software attacks -- chapter 6. Time attacks : "it's about time" -- chapter 7. Human user interface attacks : "the limited (and unlimited) user interface" -- chapter 8. Smart and/or mobile phone attacks -- chapter 9. Mobile/embedded security -- chapter 10. Generic attacks -- chapter 11. Mobile and embedded system labs -- chapter 12. Some parting advice.

Also available in print format.

There are no comments for this item.

Log in to your account to post a comment.

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh