Collect devices for penetration tests
Please sign in so that we can notify you about a reply
The diversity and availability of various inexpensive hardware platforms, such as Arduino, Raspberry Pi, etc., the simplicity of their programming, and at the same time, the almost complete absence of protection against them is made by hacker devices with a powerful and dangerous means of implementing computer attacks. The book discusses both the theoretical foundations of information security and the practical aspects of the creation of their own devices with the source codes, schemes and examples of implementation. The mechanisms of protection against this type of attacks are also considered.
The publication is intended for readers familiar with the basics of information security and who speak programming skills in high -level languages
The publication is intended for readers familiar with the basics of information security and who speak programming skills in high -level languages
Author:
Author:Andrey Aleksandrovich Biryukov
Cover:
Cover:Soft
Category:
- Category:Engineering & Transportation
- Category:Reference books
ISBN:
ISBN:978-5-97060-637-7
No reviews found