Software test attacks to break mobile and embedded devices:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fl. [u.a.]
CRC Press
2014
|
Schriftenreihe: | Chapman & Hall/CRC innovations in software engineering and software development series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXXIII, 343 S. |
ISBN: | 9781466575301 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041435373 | ||
003 | DE-604 | ||
005 | 20140212 | ||
007 | t | ||
008 | 131121s2014 xxu |||| 00||| eng d | ||
010 | |a 2013021984 | ||
020 | |a 9781466575301 |c Pbk |9 978-1-4665-7530-1 | ||
035 | |a (OCoLC)869853988 | ||
035 | |a (DE-599)BVBBV041435373 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 |a DE-29T | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Hagar, Jon Duncan |e Verfasser |0 (DE-588)1046299751 |4 aut | |
245 | 1 | 0 | |a Software test attacks to break mobile and embedded devices |c Jon Duncan Hagar |
264 | 1 | |a Boca Raton, Fl. [u.a.] |b CRC Press |c 2014 | |
300 | |a XXXIII, 343 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Chapman & Hall/CRC innovations in software engineering and software development series | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Embedded computer systems |x Security measures | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a MATHEMATICS / General |2 bisacsh | |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwaretest |0 (DE-588)4132652-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Abwehr |0 (DE-588)4141194-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Integrierte Software |0 (DE-588)4120497-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |D s |
689 | 0 | 1 | |a Integrierte Software |0 (DE-588)4120497-9 |D s |
689 | 0 | 2 | |a Softwaretest |0 (DE-588)4132652-0 |D s |
689 | 0 | 3 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 0 | 4 | |a Abwehr |0 (DE-588)4141194-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026882255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026882255 |
Datensatz im Suchindex
_version_ | 1804151551274516480 |
---|---|
adam_text | Contents
Foreword
hy Dorothy
Graham,
xi
Foreword by Lisa Crispin,
xiii
Preface,
xv
Acknowledgments,
xvii
Copyright and Trademarks Declaration Page,
xix
Introduction,
xxi
Author,
xxxiii
Chapter
1 -
Setting the Mobile and Embedded Framework
1
OBJECTIVES OF TESTING MOBILE AND EMBEDDED SOFTWARE SYSTEMS
1
WHAT IS EMBEDDED SOFTWARE?
2
WHAT ARE SMART HANDHELD AND MOBILE SYSTEMS?
3
WHY MOBILE AND EMBEDDED ATTACKS?
5
FRAMEWORK FOR ATTACKS
6
BEGINNING YOUR TEST STRATEGY
6
ATTACKS ON MOBILE AND EMBEDDED SOFTWARE
8
IF YOU ARE NEW TO TESTING
9
AN ENLIGHTENED TESTER MAKES A BETTER TESTER
10
Chapter
2 -
Developer Attacks: Taking the Code Head On
13
ATTACK
1 :
STATIC CODE ANALYSIS
14
ATTACK
2:
FINDING WHITE-BOX DATA COMPUTATION BUGS
21
ATTACK
3:
WHITE-BOX STRUCTURAL LOGIC FLOW COVERAGE
25
TEST COVERAGE CONCEPTS FOR WHITE-BOX STRUCTURAL TESTING
28
NOTE OF CONCERN IN MOBILE AND EMBEDDED ENVIRONMENTS
29
vi
■ Contents
Chapter
3 -
Control System Attacks
33
ATTACK
4:
FINDING HARDWARE-SYSTEM UNHANDLED
USES IN SOFTWARE
33
ATTACK
5:
HARDWARE-TO-SOFTWARE AND
SOFTWARE-TO-HARDWARE SIGNAL INTERFACE BUGS
39
ATTACK
6:
LONG-DURATION CONTROL ATTACK RUNS
45
ATTACK
7:
BREAKING SOFTWARE LOGIC AND/OR CONTROL LAWS
49
ATTACK
8:
FORCING THE UNUSUAL BUG CASES
54
Chapter
4 -
Hardware Software Attacks
59
ATTACK
9:
BREAKING SOFTWARE WITH HARDWARE
AND SYSTEM OPERATIONS
59
SUB-ATTACK
9.1:
BREAKING BATTERY POWER
65
ATTACK
10:
FINDING BUGS IN HARDWARE SOFTWARE
COMMUNICATIONS
66
ATTACK
11:
BREAKING SOFTWARE ERROR RECOVERY
69
ATTACK
12:
INTERFACE AND INTEGRATION TESTING
74
SUB-ATTACK
12.1:
CONFIGURATION INTEGRATION EVALUATION
80
ATTACK
13:
FINDING PROBLEMS IN SOFTWARE-SYSTEM
FAULT TOLERANCE
80
Chapter
5 -
Mobile and Embedded Software Attacks
89
ATTACK
14:
BREAKING DIGITAL SOFTWARE COMMUNICATIONS
89
ATTACK
1 5:
FINDING BUGS IN THE DATA
94
ATTACK
1 6:
BUGS IN SYSTEM-SOFTWARE COMPUTATION
97
ATTACK
17:
USING SIMULATION AND STIMULATION TO DRIVE
SOFTWARE ATTACKS
101
Chapter
6 ■
Time Attacks: It s about Time
107
ATTACK
18:
BUGS IN TIMING INTERRUPTS
AND PRIORITY INVERSIONS
108
STATE MODELING EXAMPLE
114
ATTACK
19:
FINDING TIME-RELATED BUGS
116
ATTACK
20:
TIME-RELATED SCENARIOS, STORIES, AND TOURS
121
ATTACK
21:
PERFORMANCE TESTING INTRODUCTION
125
SUPPORTING CONCEPTS
139
COMPLETING AND REPORTING THE PERFORMANCE ATTACK
140
WRAPPING UP
140
Contents ■
vii
Chapter
7 ■
Human User Interface Attacks: The Limited
___________
(and Unlimited) User Interface
_________________________143
HOW TO GET STARTED—THE
U
I
144
ATTACK
22:
FINDING SUPPORTING (USER)
DOCUMENTATION PROBLEMS
146
SUB-ATTACK
22.1 :
CONFIRMING INSTALL-ABILITY
149
ATTACK
23:
FINDING MISSING OR WRONG ALARMS
149
ATTACK
24:
FINDING BUGS IN HELP FILES
155
Chapter
8 ■
Smart and/or Mobile Phone Attacks
159
GENERAL NOTES AND ATTACK CONCEPTS APPLICABLE TO MOST
MOBILE EMBEDDED DEVICES
159
ATTACK
25:
FINDING BUGS IN APPS
161
ATTACK
26:
TESTING MOBILE AND EMBEDDED GAMES
165
ATTACK
27:
ATTACKING APP-CLOUD DEPENDENCIES
170
Chapter
9 -
Mobile/Embedded Security
177
THE CURRENT SITUATION
178
REUSING SECURITY ATTACKS
178
ATTACK
28:
PENETRATION ATTACK TEST
180
ATTACK
28.1:
PENETRATION SUB-ATTACKS:
AUTHENTICATION—PASSWORD ATTACK
186
ATTACK
28.2:
SUB-ATTACK FUZZ TEST
188
ATTACK
29:
INFORMATION THEFT—STEALING DEVICE DATA
189
ATTACK
29.1 :
SU
B-ATTACK—IDENTITY SOCIAL ENGINEERING
193
ATTACK
30:
SPOOFING ATTACKS
194
ATTACK
30.1 :
LOCATION AND/OR USER PROFILE SPOOF SUB-ATTACK
199
ATTACK
30.2:
GPS SPOOF SUB-ATTACK
200
ATTACK
31 :
ATTACKING VIRUSES ON THE RUN IN FACTORIES OR PLCS
201
Chapter
10 ■
Generic Attacks
209
ATTACK
32:
USING COMBINATORIAL TESTS
209
ATTACK
33:
ATTACKING FUNCTIONAL BUGS
215
Chapter
11 -
Mobile and Embedded System Labs
221
INTRODUCTION TO LABS
221
TO START
222
TEST FACILITIES
223
viii
■
Contents
WHY SHOULD A TESTER CARL?
224
WHAT PROBLEM DOES A TEST LAB SOLVE?
225
STAGED EVOLUTION OE
A TEST LAB 227
SIMULATION ENVIRONMENTS
227
PROTOTYPE AND EARLY
[ )[
VEK )PMENT
LABS
228
DEVELOPMENT SUPPORT TEST I
ABS 228
INTEGRATION LABS
250
PRE-PRODUCT AND PRODUCT RELEASE
(LULLTEST LAB) 230
EIELD LABS
230
OTHER PLACES LABS CAN BE REALIZED
2 52
DEVELOPING LABS: A PROJECT INSIDE OE A PROJECT
233
PLANNING LABS
233
REQUIREMENT CONSIDERATIONS LOR LABS
234
FUNCTIONAL ELEMENTS LOR A DEVELOPER SUPPORT LAB
234
FUNCTIONAL ELEMENTS LOR A SOFTWARE TEST LAB
235
TEST LAB DESIGN FACTORS
236
LAB IMPLEMENTATION
238
LAB CERTIFICATION
238
OPERATIONS AND MAINTENANCE IN THE LAB
239
LAB LESSONS LEARNED
240
AUTOMATION CONCEPTS FOR TEST LABS
241
TOOLING TO SUPPORT LAB WORK
241
TEST DATA SET-UP
243
TEST EXECUTION: FOR DEVELOPER TESTING
244
TEST EXECUTION: GENERAL
245
PRODUCT AND SECURITY ANALYSIS TOOLS
247
TOOLS FOR THE LAB TEST RESULTS RECORDING
247
PERFORMANCE ATTACK TOOLING
248
BASIC AND GENERIC TEST
SUPPORT
TOOLS
250
AUTOMATION: TEST ORACLES FOR THE LAB USING
MODELING TOOLS
251
SIMULATION, STIMULATION, AND MODELING IN THE LAB TEST BED
253
CONTINUOUS REAL-TIME, CLOSED-LOOP SIMULATIONS TO SUPPORT
LAB TEST ENVIRONMENTS
256
KEYWORD-DRIVEN TEST MODELS AND ENVIRONMENTS
259
Contents ■ ix
DATA
COLLECTION, ANALYSIS, AND REPORTING
260
POSTTEST DATA
ANALYSIS
262
POSTTEST
DATA REPORTING
265
WRAP UP: N-VERSION TESTING PROBLEMS IN LABS AND MODELING
267
FINAL THOUGHTS: INDEPENDENCE, BLIND SPOTS,
AND TEST LAB STAFFING
268
Chapter
12 ■
Some Parting Advice
273
ARE WE THERE YET?
27.5
WILL YOU GET STARTED TODAY?
274
ADVICE FOR THE NEVER EVER TESTER
273
BUG DATABASE, TAXONOMIES, AND LEARNING FROM YOUR HISTORY
274
LESSONS LEARNED AND RETROSPECTIVES 27r>
IMPLEMENTING SOFTWARE ATTACK PLANNING
275
REGRESSION AND
RETEST 277
WHERE DO YOU GO FROM HERE?
278
APPENDIX A: MOBILE AND EMBEDDED ERROR TAXONOMY: A SOFTWARE
ERROR TAXONOMY (FOR TESTERS),
279
APPENDIX B: MOBILE AND EMBEDDED CODING RULES,
289
APPENDIX C: QUALITY FIRST: DEFENDING THE SOURCE CODE SO THAT
ATTACKS ARE NOT SO EASY,
293
APPENDIX D: BASIC TIMING CONCEPTS,
299
APPENDIX E: DETAILED MAPPING OF ATTACKS,
303
APPENDIX F: UI/GUI AND GAME EVALUATION CHECKLIST,
307
APPENDIX G: RISK ANALYSIS, FMEA, AND
BRAINSTORMING,
313
REFERENCES
319
GLOSSARY,
323
INDEX,
329
|
any_adam_object | 1 |
author | Hagar, Jon Duncan |
author_GND | (DE-588)1046299751 |
author_facet | Hagar, Jon Duncan |
author_role | aut |
author_sort | Hagar, Jon Duncan |
author_variant | j d h jd jdh |
building | Verbundindex |
bvnumber | BV041435373 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 233 |
ctrlnum | (OCoLC)869853988 (DE-599)BVBBV041435373 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02312nam a2200553zc 4500</leader><controlfield tag="001">BV041435373</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140212 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131121s2014 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013021984</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466575301</subfield><subfield code="c">Pbk</subfield><subfield code="9">978-1-4665-7530-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869853988</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041435373</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hagar, Jon Duncan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046299751</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software test attacks to break mobile and embedded devices</subfield><subfield code="c">Jon Duncan Hagar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fl. [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIII, 343 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Chapman & Hall/CRC innovations in software engineering and software development series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Embedded computer systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">MATHEMATICS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Integrierte Software</subfield><subfield code="0">(DE-588)4120497-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Integrierte Software</subfield><subfield code="0">(DE-588)4120497-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026882255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026882255</subfield></datafield></record></collection> |
id | DE-604.BV041435373 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:56:37Z |
institution | BVB |
isbn | 9781466575301 |
language | English |
lccn | 2013021984 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026882255 |
oclc_num | 869853988 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-29T |
owner_facet | DE-473 DE-BY-UBG DE-29T |
physical | XXXIII, 343 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press |
record_format | marc |
series2 | Chapman & Hall/CRC innovations in software engineering and software development series |
spelling | Hagar, Jon Duncan Verfasser (DE-588)1046299751 aut Software test attacks to break mobile and embedded devices Jon Duncan Hagar Boca Raton, Fl. [u.a.] CRC Press 2014 XXXIII, 343 S. txt rdacontent n rdamedia nc rdacarrier Chapman & Hall/CRC innovations in software engineering and software development series Includes bibliographical references and index Penetration testing (Computer security) Mobile computing Security measures Embedded computer systems Security measures COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh MATHEMATICS / General bisacsh Angriff (DE-588)4142472-4 gnd rswk-swf Softwaretest (DE-588)4132652-0 gnd rswk-swf Mobiles Endgerät (DE-588)7689895-7 gnd rswk-swf Abwehr (DE-588)4141194-8 gnd rswk-swf Integrierte Software (DE-588)4120497-9 gnd rswk-swf Mobiles Endgerät (DE-588)7689895-7 s Integrierte Software (DE-588)4120497-9 s Softwaretest (DE-588)4132652-0 s Angriff (DE-588)4142472-4 s Abwehr (DE-588)4141194-8 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026882255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hagar, Jon Duncan Software test attacks to break mobile and embedded devices Penetration testing (Computer security) Mobile computing Security measures Embedded computer systems Security measures COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh MATHEMATICS / General bisacsh Angriff (DE-588)4142472-4 gnd Softwaretest (DE-588)4132652-0 gnd Mobiles Endgerät (DE-588)7689895-7 gnd Abwehr (DE-588)4141194-8 gnd Integrierte Software (DE-588)4120497-9 gnd |
subject_GND | (DE-588)4142472-4 (DE-588)4132652-0 (DE-588)7689895-7 (DE-588)4141194-8 (DE-588)4120497-9 |
title | Software test attacks to break mobile and embedded devices |
title_auth | Software test attacks to break mobile and embedded devices |
title_exact_search | Software test attacks to break mobile and embedded devices |
title_full | Software test attacks to break mobile and embedded devices Jon Duncan Hagar |
title_fullStr | Software test attacks to break mobile and embedded devices Jon Duncan Hagar |
title_full_unstemmed | Software test attacks to break mobile and embedded devices Jon Duncan Hagar |
title_short | Software test attacks to break mobile and embedded devices |
title_sort | software test attacks to break mobile and embedded devices |
topic | Penetration testing (Computer security) Mobile computing Security measures Embedded computer systems Security measures COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh MATHEMATICS / General bisacsh Angriff (DE-588)4142472-4 gnd Softwaretest (DE-588)4132652-0 gnd Mobiles Endgerät (DE-588)7689895-7 gnd Abwehr (DE-588)4141194-8 gnd Integrierte Software (DE-588)4120497-9 gnd |
topic_facet | Penetration testing (Computer security) Mobile computing Security measures Embedded computer systems Security measures COMPUTERS / Software Development & Engineering / General COMPUTERS / Security / General MATHEMATICS / General Angriff Softwaretest Mobiles Endgerät Abwehr Integrierte Software |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026882255&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hagarjonduncan softwaretestattackstobreakmobileandembeddeddevices |