top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Autore Hagar Jon Duncan
Edizione [1st edition]
Pubbl/distr/stampa Chapman & Hall/CRC [Imprint], Oct. 2017
Descrizione fisica 1 online resource (xxxi, 316 pages) : illustrations
Disciplina 005.14
005.8
Collana Chapman & Hall/CRC Innovations in Software Engineering
Soggetto topico Penetration testing (Computer security)
Mobile computing - Security measures
Embedded computer systems - Security measures
ISBN 1-4987-6014-7
0-429-07191-4
1-138-46844-4
1-4665-7530-1
Classificazione COM051230COM053000MAT000000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover
Record Nr. UNINA-9910787572803321
Hagar Jon Duncan  
Chapman & Hall/CRC [Imprint], Oct. 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Software test attacks to break mobile and embedded devices / / Jon Duncan Hagar
Autore Hagar Jon Duncan
Edizione [1st edition]
Pubbl/distr/stampa Chapman & Hall/CRC [Imprint], Oct. 2017
Descrizione fisica 1 online resource (xxxi, 316 pages) : illustrations
Disciplina 005.14
005.8
Collana Chapman & Hall/CRC Innovations in Software Engineering
Soggetto topico Penetration testing (Computer security)
Mobile computing - Security measures
Embedded computer systems - Security measures
ISBN 1-4987-6014-7
0-429-07191-4
1-138-46844-4
1-4665-7530-1
Classificazione COM051230COM053000MAT000000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover
Record Nr. UNINA-9910823022103321
Hagar Jon Duncan  
Chapman & Hall/CRC [Imprint], Oct. 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui