000 02179cam a2200337 i 4500
001 22066072
003 NUST
005 20250627151404.0
008 210604s2022 caua b 001 0 eng
010 _a 2021027424
020 _a9781593278748
_q(print)
020 _z9781593278755
_q(ebook)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
082 0 0 _a006.22,WOU
100 1 _aWoudenberg, Jasper van,
_eauthor.
_9129266
245 1 4 _aThe hardware hacking handbook :
_bbreaking embedded security with hardware attacks /
_cby Jasper van Woudenberg and Colin O'Flynn.
264 1 _aSan Francisco, CA :
_bNo Starch Press,
_c[2022]
300 _axxviii, 479 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
505 _aDental Hygiene: Introduction to Embedded Security (Page-1), Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces (Page-35), Casing the Joint: Identifying Components and Gathering Information (Page-71), Bull in a Porcelain Shop: Introducing Fault Injection (Page-119), Don’t Lick the Probe: How to Inject Faults (Page-147), Bench Time: Fault Injection Lab (Page-189), X Marks the Spot: Trezor One Wallet Memory Dump (Page-223), I’ve Got the Power: Introduction to Power Analysis (Page-245), Bench Time: Simple Power Analysis (Page-265), Splitting the Difference: Differential Power Analysis (Page-293), Gettin’ Nerdy with It: Advanced Power Analysis (Page-323), Bench Time: Differential Power Analysis (Page-361), No Kiddin’: Real-Life Examples (Page-387), Think of the Children: Countermeasures, Certifications, and Goodbytes (Page-401).
520 _cProvided by publisher.
650 0 _aEmbedded computer systems
_xSecurity measures.
_9129267
650 0 _aElectronic apparatus and appliances
_xSecurity measures.
_9129268
650 0 _aPenetration testing (Computer security)
_994117
700 1 _aO'Flynn, Colin,
_eauthor.
_9129269
776 0 8 _iOnline version:
_aWoudenberg, Jasper van.
_tHardware hacking handbook
_dSan Francisco, CA : No Starch Press, 2022
_z9781593278755
_w(DLC) 2021027425
942 _2ddc
_cREF
999 _c613951
_d613951