1.

Record Nr.

UNINA990009265190403321

Autore

Hampl, Franz <1910-2000>

Titolo

Der König der Makedonen : inaugural-Dissertation genehmigt von der philologisch-historischen Abteilung der Philosophischen Fakultät der Universität Leipzig / vorgelegt von Franz Hampl

Pubbl/distr/stampa

Druck von Thomas und Hubert : Weida i Thür, 1934

Descrizione fisica

88 p. ; 24 cm

Locazione

DDR

Collocazione

Arangio Ruiz 17

Lingua di pubblicazione

Tedesco

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910407732303321

Autore

Belous Anatoly

Titolo

Viruses, Hardware and Software Trojans : Attacks and Countermeasures / / by Anatoly Belous, Vitali Saladukha

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020

ISBN

3-030-47218-3

Edizione

[1st ed. 2020.]

Descrizione fisica

1 online resource (839 pages)

Disciplina

005.8

621.3815

Soggetti

Electronic circuits

Computer engineering

Internet of things

Embedded computer systems

Microprocessors

Circuits and Systems

Cyber-physical systems, IoT

Processor Architectures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa



Livello bibliografico

Monografia

Nota di contenuto

Introduction -- Information weapon: concepts, means, methods and examples of application -- Computer Viruses, Malicious Logic and Spyware -- Hardware Trojans in Electronic Devices -- Hardware Trojans in Microcircuits -- Methods of Identification of Hardware Trojans in Integrated Circuits -- Reverse Engineering of Integrated Circuits -- Methods of counteracting hardware IC Trojans -- Is the Trojan phenomenon a new stage in the evolution of modern weapons?.

Sommario/riassunto

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.