LEADER 01782nam 2200445 450 001 9910703780803321 005 20150504123719.0 035 $a(CKB)5470000002433910 035 $a(OCoLC)908339288 035 $a(EXLCZ)995470000002433910 100 $a20150504d2014 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aScientific cooperation $eprotocol between the United States of America and Japan extending the agreement of June 20, 1988, as amended and extended, signed at Tokyo, April 23, 2014 210 1$a[Washington, D.C.] :$cUnited States Department of State,$d[2014?] 215 $a1 online resource (7 unnumbered pages) 225 1 $aTreaties and other international acts series ;$v14-720 300 $aTitle from title screen (viewed on May 4, 2015). 517 3 $aProtocol between the United States of America and Japan extending the agreement of June 20, 1988, as amended and extended, signed at Tokyo, April 23, 2014 606 $aCommunication of technical information$zUnited States 606 $aCommunication of technical information$zJapan 606 $aResearch$xLaw and legislation$zUnited States 606 $aResearch$xLaw and legislation$zJapan 608 $aTreaties.$2lcgft 615 0$aCommunication of technical information 615 0$aCommunication of technical information 615 0$aResearch$xLaw and legislation 615 0$aResearch$xLaw and legislation 712 02$aUnited States.$bDepartment of State, 712 02$aJapan, 712 02$aUnited States, 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910703780803321 996 $aScientific cooperation$93438017 997 $aUNINA LEADER 04307oam 2200601 450 001 9910823022103321 005 20190911103513.0 010 $a1-4987-6014-7 010 $a0-429-07191-4 010 $a1-138-46844-4 010 $a1-4665-7530-1 024 3 $a9781138468443 035 $a(OCoLC)862109669 035 $a(MiFhGG)GVRL8QDQ 035 $a(EXLCZ)992670000000394417 100 $a20130606h20142014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aSoftware test attacks to break mobile and embedded devices /$fJon Duncan Hagar 205 $a1st edition 210 $cChapman & Hall/CRC [Imprint]$dOct. 2017$aBoca Raton $cCRC Press LLC$aFlorence $cTaylor & Francis Group [distributor] 210 1$aBoca Raton :$cCRC Press,$d[2014] 210 4$d?2014 215 $a1 online resource (xxxi, 316 pages) $cillustrations 225 0 $aChapman & Hall/CRC Innovations in Software Engineering 300 $aDescription based upon print version of record. 311 $a1-322-66757-8 311 $a1-4665-7531-X 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks 327 $aChapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover 330 8 $aAnnotation$bAddress Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices. 410 0$aChapman & Hall/CRC innovations in software engineering and software development series. 606 $aPenetration testing (Computer security) 606 $aMobile computing$xSecurity measures 606 $aEmbedded computer systems$xSecurity measures 615 0$aPenetration testing (Computer security) 615 0$aMobile computing$xSecurity measures. 615 0$aEmbedded computer systems$xSecurity measures. 676 $a005.14 676 $a005.8 686 $aCOM051230$aCOM053000$aMAT000000$2bisacsh 700 $aHagar$b Jon Duncan$01235754 712 02$aCRC Press LLC. 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910823022103321 996 $aSoftware test attacks to break mobile and embedded devices$94057990 997 $aUNINA