Cargando…
Seven deadliest USB attacks
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. Y...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412173 |
_version_ | 1780923871704121344 |
---|---|
author | Anderson, Brian Anderson, Barbara |
author_facet | Anderson, Brian Anderson, Barbara |
author_sort | Anderson, Brian |
collection | CERN |
description | Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum |
id | cern-1412173 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-14121732021-04-22T00:46:04Zhttp://cds.cern.ch/record/1412173engAnderson, BrianAnderson, BarbaraSeven deadliest USB attacksComputing and ComputersDo you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdumElsevieroai:cds.cern.ch:14121732010 |
spellingShingle | Computing and Computers Anderson, Brian Anderson, Barbara Seven deadliest USB attacks |
title | Seven deadliest USB attacks |
title_full | Seven deadliest USB attacks |
title_fullStr | Seven deadliest USB attacks |
title_full_unstemmed | Seven deadliest USB attacks |
title_short | Seven deadliest USB attacks |
title_sort | seven deadliest usb attacks |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412173 |
work_keys_str_mv | AT andersonbrian sevendeadliestusbattacks AT andersonbarbara sevendeadliestusbattacks |