|刊登類別:
賣家於 6月16日, 日 03:16 結束刊登物品,因為物品已不再有售。
有類似物品要出售?

Jasper van Woudenberg Colin O'Flynn The Hardware Hacking Handbook (Paperback)

Another great item from Rarewaves USA | Free delivery!
狀況:
全新
至少還有 10 件 / 賣出 1 件
價格:
US $49.04
大約HK$ 382.91
運費:
免費 Economy Shipping. 查看詳情— 運送
所在地:60502, 美國
送達日期:
估計於 6月28日, 五7月10日, 三之間送達 運送地點 43230
估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
退貨:
30 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

安心購物

高度評價賣家
值得信賴的賣家,發貨快,輕鬆退貨。 

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:296129696869
上次更新時間: 2024-05-02 21:24:15查看所有版本查看所有版本

物品細節

物品狀況
全新: 全新,未閱讀過和使用過的書籍,狀況完好,不存在缺頁或內頁受損。 查看所有物品狀況定義會在新視窗或分頁中開啟
Book Title
The Hardware Hacking Handbook
Title
The Hardware Hacking Handbook
Subtitle
Breaking Embedded Security with Hardware Attacks
ISBN-10
1593278748
EAN
9781593278748
ISBN
9781593278748
Genre
Computing & Internet
Release Date
12/21/2021
Release Year
2021
Country/Region of Manufacture
US
Subject Area
Computers, Technology & Engineering
Publication Name
Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
Publisher
No Starch Press, Incorporated
Item Length
9.2 in
Subject
Security / General, Security / Networking, Electrical
Publication Year
2021
Type
Textbook
Format
Uk-Trade Paper
Language
English
Item Height
0.9 in
Author
Colin O'flynn, Jasper Van Woudenberg
Item Weight
34 Oz
Item Width
7.1 in
Number of Pages
512 Pages

關於產品

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278748
ISBN-13
9781593278748
eBay Product ID (ePID)
243009939

Product Key Features

Number of Pages
512 Pages
Publication Name
Hardware Hacking Handbook : Breaking Embedded Security with Hardware Attacks
Language
English
Publication Year
2021
Subject
Security / General, Security / Networking, Electrical
Type
Textbook
Subject Area
Computers, Technology & Engineering
Author
Colin O'flynn, Jasper Van Woudenberg
Format
Uk-Trade Paper

Dimensions

Item Height
0.9 in
Item Weight
34 Oz
Item Length
9.2 in
Item Width
7.1 in

Additional Product Features

Intended Audience
Trade
LCCN
2021-027424
Reviews
"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that's needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied." --Yifan Lu, Security Researcher
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
006.22
Table Of Content
Introduction Chapter 1: Dental Hygiene: Introduction to Embedded Security Chapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral Interfaces Chapter 3: Casing the Joint: Identifying Components and Gathering Information Chapter 4: Bull in a China Shop: Introducing Fault Injection Chapter 5: Don't Lick the Probe: How to Inject Faults Chapter 6: Bench Time: Fault Injection Lab Chapter 7: X Marks the Spot: EMFI Memory Dumping of Trezor Chapter 8: I've Got the Power: Introduction to Power Analysis Chapter 9: Bench Time: Simple Power Analysis Chapter 10: Splitting the Difference: Differential Power Analysis Chapter 11: Advanced Power Analysis Chapter 12: A DPA/SCA Lab: Breaking an AES-256 Bootloader Chapter 13: No Kiddin': Real-Life Examples Chapter 14: Think of the Children: Countermeasures, Certifications, and Goodbytes Appendix A: Maxing Out Your Credit Card: Setting Up a Test Lab Appendix B: All Your Base Are Belong to Us: Popular Pinouts
Synopsis
Hardware attacks on embedded systems explained by notable experts Jasper van Woudenberg and Colin O'Flynn. The authors explore the embedded system threat model, hardware interfaces, various side channel and fault injection attacks (such as timing attacks, simple power analysis, and differential power analysis), as well as voltage and clock glitching. The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You'll start with a crash course in embedded systems and threats to them, as well as hardware interfaces and how to set up a test lab, all while learning invaluable theoretical background. Real-life examples and hands-on labs throughout allow you to explore hardware interfaces and complete various side channel or fault attacks on real devices. You'll learn fault injection attacks and methods like voltage glitching, clock glitching, and optical and electromagnetic fault injection, side channel power analysis, and differential fault analysis., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere--in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn: - How to model security threats, using attacker profiles, assets, objectives, and countermeasures - Electrical basics that will help you understand communication interfaces, signaling, and measurement - How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips - How to use timing and power analysis attacks to extract passwords and cryptographic keys - Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere-in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony's PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab - like a multimeter and an oscilloscope - with options for every type of budget. You'll learn- How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you're an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource - one you'll always want to have onhand., Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems.
LC Classification Number
TK7870
ebay_catalog_id
4
Copyright Date
2018

賣家提供的物品說明

rarewaves-usa

rarewaves-usa

97.2% 正面信用評價
已賣出 124.4 萬 件物品
瀏覽商店聯絡

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
5.0
運送速度
4.9
溝通
4.8

賣家信用評價 (449,433)

s***s (1186)- 買家留下的信用評價。
過去 6 個月
購買已獲認證
Great Price and Fast Shipping.
查看所有信用評價