IoT system testing : an IoT journey from devices to analytics and the edge / / Jon Duncan Hagar |
Autore | Hagar Jon Duncan |
Pubbl/distr/stampa | New York, New York : , : Apress Media LLC, , [2022] |
Descrizione fisica | 1 online resource (326 pages) |
Disciplina | 005.8 |
Soggetto topico |
Internet of things - Security measures - Testing
Computer security Penetration testing (Computer security) |
ISBN | 1-4842-8276-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I: Getting Started -- Chapter 1: The Internet of Things, V and V, and Testing -- Chapter 2: IoT Technology in Time and Space -- Chapter 3: Big Picture Lessons Learned in IoT Project Test Planning -- Chapter 4: Factors Driving IoT Testing/V and V Selection and Planning -- Chapter 5: Beginner Keys for Starting IoT Test Planning -- Part II: IoT Planning, Test, Strategy and Architecture - Team Leadership -- Chapter 6: IoT Test Plan: Strategy and Architecture Introductions -- Chapter 7: IoT Test Planning and Strategy for Hardware and Software -- Chapter 8: Planning for the IoT Tester on Environments and Testing Details -- Chapter 9: System Engineering Concepts in IoT Test Planning -- Part III: IoT Test Designs and Security Assessments -- Chapter 10: IoT Test Design: Frameworks, Techniques, Attacks, Patterns, and Tours -- Chapter 11: Classic IoT V and V/Test Concepts, Techniques, and Practices -- Chapter 12: Test Approaches and Quality Assessments for IoT Agile/DevOps -- Chapter 13: IoT Software Security Test Attacks and Designs -- Chapter 14: OWASP IoT Information Pointer, and Logging Events -- Chapter 15: Internal Security Team Penetration Test Process -- Chapter 16: IoT Test Environment Introduction -- Part IV: IoT Architectures, Environments, and Integrated Independent Testing -- Chapter 17: Architectures Critical to Project Success -- Chapter 18: Overview of IoT Software Architectures: Products and Testing Support -- Chapter 19: IoT STA System: Software Integration Lab (SIL) Environments -- Chapter 20: Tools for the Software-System Integration Lab (SIL) -- Chapter 21: Environments for Independent Testing and V and V on Large IoT Systems -- Chapter 22: Self-Organizing Data Analytics (SODA): IoT Data Analytics, AI, and Statistics -- Appendix A: IoT Supporting Interface, Hardware, Platform, and Protocol Standards -- Appendix B: Careers in IoT Testing -- Appendix C: IoT Testing Start-up Checklist. |
Record Nr. | UNINA-9910595052003321 |
Hagar Jon Duncan | ||
New York, New York : , : Apress Media LLC, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar |
Autore | Hagar Jon Duncan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chapman & Hall/CRC [Imprint], Oct. 2017 |
Descrizione fisica | 1 online resource (xxxi, 316 pages) : illustrations |
Disciplina |
005.14
005.8 |
Collana | Chapman & Hall/CRC Innovations in Software Engineering |
Soggetto topico |
Penetration testing (Computer security)
Mobile computing - Security measures Embedded computer systems - Security measures |
ISBN |
1-4987-6014-7
0-429-07191-4 1-138-46844-4 1-4665-7530-1 |
Classificazione | COM051230COM053000MAT000000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover |
Record Nr. | UNINA-9910787572803321 |
Hagar Jon Duncan | ||
Chapman & Hall/CRC [Imprint], Oct. 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar |
Autore | Hagar Jon Duncan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chapman & Hall/CRC [Imprint], Oct. 2017 |
Descrizione fisica | 1 online resource (xxxi, 316 pages) : illustrations |
Disciplina |
005.14
005.8 |
Collana | Chapman & Hall/CRC Innovations in Software Engineering |
Soggetto topico |
Penetration testing (Computer security)
Mobile computing - Security measures Embedded computer systems - Security measures |
ISBN |
1-4987-6014-7
0-429-07191-4 1-138-46844-4 1-4665-7530-1 |
Classificazione | COM051230COM053000MAT000000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover |
Record Nr. | UNINA-9910823022103321 |
Hagar Jon Duncan | ||
Chapman & Hall/CRC [Imprint], Oct. 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|