Hardware Hacking Handbook / Libristo.pl
Hardware Hacking Handbook

Kod: 18663358

Hardware Hacking Handbook

Autor Jasper van Woudenberg, Colin O'Flynn

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.Embedded devices are chip-size microcomputers small enough to be ... więcej

183.53

Zwykle: 215.97 zł

Oszczędzasz 32.43 zł


Dostępna u dostawcy
Wysyłamy do 4 dni
Dodaj do schowka

Zobacz książki o podobnej tematyce

Podaruj tę książkę jeszcze dziś
  1. Zamów książkę i wybierz "Wyślij jako prezent".
  2. Natychmiast wyślemy Ci bon podarunkowy, który możesz przekazać adresatowi prezentu.
  3. Książka zostanie wysłana do adresata, a Ty o nic nie musisz się martwić.

Dowiedz się więcej

Więcej informacji o Hardware Hacking Handbook

Za ten zakup dostaniesz 107 punkty

Opis

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware.Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they re everywhere in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks.Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab like a multimeter and an oscilloscope with options for every type of budget. You ll learn:   How to model security threats, using attacker profiles, assets, objectives, and countermeasures   Electrical basics that will help you understand communication interfaces, signaling, and measurement    How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips    How to use timing and power analysis attacks to extract passwords and cryptographic keys   Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualizationWhether you re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource one you ll always want to have onhand.

Szczegóły książki

Kategoria Książki po angielsku Computing & information technology Computer hardware

183.53

Ulubione w innej kategorii


250 000
zadowolonych klientów

Od roku 2008 obsłużyliśmy wielu miłośników książek, ale dla nas każdy był tym wyjątkowym.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl Wszelkie prawa zastrzeżonePrywatnieCookies


Konto: Logowanie
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Koszyk ( pusty )

Kup za 299 zł i
zyskaj darmową dostawę.

Twoja lokalizacja: