The hardware hacking handbook: breaking embedded security with hardware attacks
"A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"--
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco, CA
No Starch Press
2022
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098129835/?ar |
Zusammenfassung: | "A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Umfang: | 1 Online-Ressource |
ISBN: | 9781593278755 1593278756 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-069807817 | ||
003 | DE-627-1 | ||
005 | 20240228121411.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211110s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781593278755 |c ebook |9 978-1-59327-875-5 | ||
020 | |a 1593278756 |9 1-59327-875-6 | ||
035 | |a (DE-627-1)069807817 | ||
035 | |a (DE-599)KEP069807817 | ||
035 | |a (ORHE)9781098129835 | ||
035 | |a (DE-627-1)069807817 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.2/2 |2 23 | |
100 | 1 | |a Woudenberg, Jasper van |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The hardware hacking handbook |b breaking embedded security with hardware attacks |c by Jasper van Woudenberg and Colin O'Flynn |
264 | 1 | |a San Francisco, CA |b No Starch Press |c 2022 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a "A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"-- | ||
650 | 0 | |a Embedded computer systems |x Security measures | |
650 | 0 | |a Electronic apparatus and appliances |x Security measures | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 4 | |a Systèmes enfouis (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Penetration testing (Computer security) | |
700 | 1 | |a O'Flynn, Colin |e VerfasserIn |4 aut | |
776 | 1 | |z 9781593278748 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781593278748 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098129835/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-069807817 |
---|---|
_version_ | 1829007741703684096 |
adam_text | |
any_adam_object | |
author | Woudenberg, Jasper van O'Flynn, Colin |
author_facet | Woudenberg, Jasper van O'Flynn, Colin |
author_role | aut aut |
author_sort | Woudenberg, Jasper van |
author_variant | j v w jv jvw c o co |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)069807817 (DE-599)KEP069807817 (ORHE)9781098129835 |
dewey-full | 006.2/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.2/2 |
dewey-search | 006.2/2 |
dewey-sort | 16.2 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02084cam a22004572c 4500</leader><controlfield tag="001">ZDB-30-ORH-069807817</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121411.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211110s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593278755</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-59327-875-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593278756</subfield><subfield code="9">1-59327-875-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069807817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP069807817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098129835</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)069807817</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.2/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Woudenberg, Jasper van</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The hardware hacking handbook</subfield><subfield code="b">breaking embedded security with hardware attacks</subfield><subfield code="c">by Jasper van Woudenberg and Colin O'Flynn</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Embedded computer systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic apparatus and appliances</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes enfouis (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Flynn, Colin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781593278748</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781593278748</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098129835/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-069807817 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:07Z |
institution | BVB |
isbn | 9781593278755 1593278756 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | No Starch Press |
record_format | marc |
spelling | Woudenberg, Jasper van VerfasserIn aut The hardware hacking handbook breaking embedded security with hardware attacks by Jasper van Woudenberg and Colin O'Flynn San Francisco, CA No Starch Press 2022 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed "A deep dive into hardware attacks on embedded systems explained by experts in the field through real-life examples and hands-on labs. Topics include the embedded system threat model, hardware interfaces, various side-channel and fault injection attacks, and voltage and clock glitching"-- Embedded computer systems Security measures Electronic apparatus and appliances Security measures Penetration testing (Computer security) Systèmes enfouis (Informatique) ; Sécurité ; Mesures Tests d'intrusion O'Flynn, Colin VerfasserIn aut 9781593278748 Erscheint auch als Druck-Ausgabe 9781593278748 |
spellingShingle | Woudenberg, Jasper van O'Flynn, Colin The hardware hacking handbook breaking embedded security with hardware attacks Embedded computer systems Security measures Electronic apparatus and appliances Security measures Penetration testing (Computer security) Systèmes enfouis (Informatique) ; Sécurité ; Mesures Tests d'intrusion |
title | The hardware hacking handbook breaking embedded security with hardware attacks |
title_auth | The hardware hacking handbook breaking embedded security with hardware attacks |
title_exact_search | The hardware hacking handbook breaking embedded security with hardware attacks |
title_full | The hardware hacking handbook breaking embedded security with hardware attacks by Jasper van Woudenberg and Colin O'Flynn |
title_fullStr | The hardware hacking handbook breaking embedded security with hardware attacks by Jasper van Woudenberg and Colin O'Flynn |
title_full_unstemmed | The hardware hacking handbook breaking embedded security with hardware attacks by Jasper van Woudenberg and Colin O'Flynn |
title_short | The hardware hacking handbook |
title_sort | hardware hacking handbook breaking embedded security with hardware attacks |
title_sub | breaking embedded security with hardware attacks |
topic | Embedded computer systems Security measures Electronic apparatus and appliances Security measures Penetration testing (Computer security) Systèmes enfouis (Informatique) ; Sécurité ; Mesures Tests d'intrusion |
topic_facet | Embedded computer systems Security measures Electronic apparatus and appliances Security measures Penetration testing (Computer security) Systèmes enfouis (Informatique) ; Sécurité ; Mesures Tests d'intrusion |
work_keys_str_mv | AT woudenbergjaspervan thehardwarehackinghandbookbreakingembeddedsecuritywithhardwareattacks AT oflynncolin thehardwarehackinghandbookbreakingembeddedsecuritywithhardwareattacks AT woudenbergjaspervan hardwarehackinghandbookbreakingembeddedsecuritywithhardwareattacks AT oflynncolin hardwarehackinghandbookbreakingembeddedsecuritywithhardwareattacks |