Software Test Attacks to Break Mobile and Embedded Devices: Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
Autor Jon Duncan Hagaren Limba Engleză Hardback – 18 dec 2017
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 344.37 lei 43-57 zile | |
CRC Press – 25 sep 2013 | 344.37 lei 43-57 zile | |
Hardback (1) | 976.73 lei 43-57 zile | |
CRC Press – 18 dec 2017 | 976.73 lei 43-57 zile |
Preț: 976.73 lei
Preț vechi: 1427.97 lei
-32% Nou
Puncte Express: 1465
Preț estimativ în valută:
186.94€ • 194.84$ • 155.62£
186.94€ • 194.84$ • 155.62£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138468443
ISBN-10: 1138468444
Pagini: 377
Dimensiuni: 178 x 254 x 27 mm
Greutate: 0.86 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
ISBN-10: 1138468444
Pagini: 377
Dimensiuni: 178 x 254 x 27 mm
Greutate: 0.86 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series
Public țintă
GeneralRecenzii
"Using the framework of attacks popularized by James Whittaker’s books, Jon Duncan Hagar describes those that are relevant here and extends the approach with new attacks specifically for mobile and embedded systems. He provides detailed information and guidance on how to test more effectively and efficiently in the mobile and embedded world. … Jon shows you what to test and how to test, giving ideas that you can use to do better testing of mobile devices now and save yourself serious trouble later on.
Jon’s extensive experience (much of it in the embedded world), his thorough research, and his deep knowledge give this book a solid foundation and provide helpful guidance and steps to take in applying testing attacks to mobile and embedded devices."
—From the Foreword by Dorothy Graham, Software Testing Consultant
"Every tester who wants to keep current needs to read this book, and you can read with confidence knowing you are being guided by the best in this business. … Learn by doing, with this book as your guide."
—From the Foreword by Lisa Crispin, Agile Testing Coach and Practitioner
Jon’s extensive experience (much of it in the embedded world), his thorough research, and his deep knowledge give this book a solid foundation and provide helpful guidance and steps to take in applying testing attacks to mobile and embedded devices."
—From the Foreword by Dorothy Graham, Software Testing Consultant
"Every tester who wants to keep current needs to read this book, and you can read with confidence knowing you are being guided by the best in this business. … Learn by doing, with this book as your guide."
—From the Foreword by Lisa Crispin, Agile Testing Coach and Practitioner
Notă biografică
Jon Hagar is the principal (CEO/CTO) and senior software test engineer at Grand Software Testing. For over 30 years he has worked on systems and software engineering, specializing in testing/verification and validation. He is the lead editor on ISO/IEC/IEEE29119 Software Test Standard, a member of the IEEE1012 V&V Plan working group, and co-chair on the OMG UML testing profile standard. Jon holds a patent on web test technologies and has published numerous articles on software reliability, testing, test tools, formal methods, and embedded systems. He has a B.S. in mathematics with a specialization in civil engineering and software from Metropolitan State College in Denver, Colorado, and an M.S. in computer science with a specialization in software engineering and testing from Colorado State University.
Cuprins
Setting the Mobile and Embedded Framework. Developer Attacks: Taking the Code Head On. Control System Attacks. Hardware Software Attacks. Mobile and Embedded Software Attacks. Time Attacks: It's about Time. Human User Interface Attacks: The Limited (and Unlimited) User Interface. Smart and/or Mobile Phone Attacks. Mobile/Embedded Security. Generic Attacks. Mobile and Embedded System Labs. Some Parting Advice. Appendices. References. Glossary. Index.
Descriere
The fruit of a conference that gathered seven very active researchers in the field, Combinatorial Design and their Applications presents a wide but representative range of topics on the non-geometrical aspects of design theory. By concentrating on a few important areas, the authors succeed in providing greater detail in these areas in a more complete and accessible form. Through their contributions to this collection, they help fill a gap in the available combinatorics literature.
The papers included in this volume cover recent developments in areas of current interest, such as difference sets, cryptography, and optimal linear codes.
Researchers in combinatorics and other areas of pure mathematics, along with researchers in statistics and computer design will find in-depth, up-to-date discussions of design theory and the application of the theory to statistical design, codes, and cryptography.
The papers included in this volume cover recent developments in areas of current interest, such as difference sets, cryptography, and optimal linear codes.
Researchers in combinatorics and other areas of pure mathematics, along with researchers in statistics and computer design will find in-depth, up-to-date discussions of design theory and the application of the theory to statistical design, codes, and cryptography.