top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
IoT system testing : an IoT journey from devices to analytics and the edge / / Jon Duncan Hagar
IoT system testing : an IoT journey from devices to analytics and the edge / / Jon Duncan Hagar
Autore Hagar Jon Duncan
Pubbl/distr/stampa New York, New York : , : Apress Media LLC, , [2022]
Descrizione fisica 1 online resource (326 pages)
Disciplina 005.8
Soggetto topico Internet of things - Security measures - Testing
Computer security
Penetration testing (Computer security)
ISBN 1-4842-8276-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Getting Started -- Chapter 1: The Internet of Things, V and V, and Testing -- Chapter 2: IoT Technology in Time and Space -- Chapter 3: Big Picture Lessons Learned in IoT Project Test Planning -- Chapter 4: Factors Driving IoT Testing/V and V Selection and Planning -- Chapter 5: Beginner Keys for Starting IoT Test Planning -- Part II: IoT Planning, Test, Strategy and Architecture - Team Leadership -- Chapter 6: IoT Test Plan: Strategy and Architecture Introductions -- Chapter 7: IoT Test Planning and Strategy for Hardware and Software -- Chapter 8: Planning for the IoT Tester on Environments and Testing Details -- Chapter 9: System Engineering Concepts in IoT Test Planning -- Part III: IoT Test Designs and Security Assessments -- Chapter 10: IoT Test Design: Frameworks, Techniques, Attacks, Patterns, and Tours -- Chapter 11: Classic IoT V and V/Test Concepts, Techniques, and Practices -- Chapter 12: Test Approaches and Quality Assessments for IoT Agile/DevOps -- Chapter 13: IoT Software Security Test Attacks and Designs -- Chapter 14: OWASP IoT Information Pointer, and Logging Events -- Chapter 15: Internal Security Team Penetration Test Process -- Chapter 16: IoT Test Environment Introduction -- Part IV: IoT Architectures, Environments, and Integrated Independent Testing -- Chapter 17: Architectures Critical to Project Success -- Chapter 18: Overview of IoT Software Architectures: Products and Testing Support -- Chapter 19: IoT STA System: Software Integration Lab (SIL) Environments -- Chapter 20: Tools for the Software-System Integration Lab (SIL) -- Chapter 21: Environments for Independent Testing and V and V on Large IoT Systems -- Chapter 22: Self-Organizing Data Analytics (SODA): IoT Data Analytics, AI, and Statistics -- Appendix A: IoT Supporting Interface, Hardware, Platform, and Protocol Standards -- Appendix B: Careers in IoT Testing -- Appendix C: IoT Testing Start-up Checklist.
Record Nr. UNINA-9910595052003321
Hagar Jon Duncan  
New York, New York : , : Apress Media LLC, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Autore Hagar Jon Duncan
Edizione [1st edition]
Pubbl/distr/stampa Chapman & Hall/CRC [Imprint], Oct. 2017
Descrizione fisica 1 online resource (xxxi, 316 pages) : illustrations
Disciplina 005.14
005.8
Collana Chapman & Hall/CRC Innovations in Software Engineering
Soggetto topico Penetration testing (Computer security)
Mobile computing - Security measures
Embedded computer systems - Security measures
ISBN 1-4987-6014-7
0-429-07191-4
1-138-46844-4
1-4665-7530-1
Classificazione COM051230COM053000MAT000000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover
Record Nr. UNINA-9910787572803321
Hagar Jon Duncan  
Chapman & Hall/CRC [Imprint], Oct. 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Autore Hagar Jon Duncan
Edizione [1st edition]
Pubbl/distr/stampa Chapman & Hall/CRC [Imprint], Oct. 2017
Descrizione fisica 1 online resource (xxxi, 316 pages) : illustrations
Disciplina 005.14
005.8
Collana Chapman & Hall/CRC Innovations in Software Engineering
Soggetto topico Penetration testing (Computer security)
Mobile computing - Security measures
Embedded computer systems - Security measures
ISBN 1-4987-6014-7
0-429-07191-4
1-138-46844-4
1-4665-7530-1
Classificazione COM051230COM053000MAT000000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover
Record Nr. UNINA-9910823022103321
Hagar Jon Duncan  
Chapman & Hall/CRC [Imprint], Oct. 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui