Vendeur : Universitätsbuchhandlung Herta Hold GmbH, Berlin, Allemagne
EUR 19
Quantité disponible : 1 disponible(s)
Ajouter au panierXV, 108 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. T-Labs Series in Telecommunication Services. Sprache: Englisch.
Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni
EUR 52,55
Quantité disponible : 1 disponible(s)
Ajouter au panierEtat : Like New. Most items will be dispatched the same or the next working day. An apparently unread copy in perfect condition. Dust cover is intact with no nicks or tears. Spine has no signs of creasing. Pages are clean and not marred by notes or folds of any kind.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 91,25
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 103,81
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 104,15
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 92,28
Quantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 110,29
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 138,26
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 124.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 139,15
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. 126.
Vendeur : preigu, Osnabrück, Allemagne
EUR 88,25
Quantité disponible : 5 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Detecting Peripheral-based Attacks on the Host Memory | Patrick Stewin | Taschenbuch | Previously published in hardcover | xv | Englisch | 2016 | Springer | EAN 9783319386188 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 153,02
Quantité disponible : 2 disponible(s)
Ajouter au panierHardcover. Etat : Brand New. 2015 edition. 108 pages. 9.25x6.25x0.75 inches. In Stock.
Edité par Springer, Berlin, Springer International Publishing, Springer, 2016
ISBN 10 : 3319386182 ISBN 13 : 9783319386188
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 104,32
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit.Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.
Edité par Springer International Publishing, Springer International Publishing Jan 2015, 2015
ISBN 10 : 3319135147 ISBN 13 : 9783319135144
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 106,99
Quantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. Neuware -This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host¿s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process ¿ an aspect attackers are quick to exploit.Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host¿s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 124 pp. Englisch.
Edité par Springer International Publishing, 2015
ISBN 10 : 3319135147 ISBN 13 : 9783319135144
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 106,99
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit.Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
EUR 157,01
Quantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Like New. Like New. book.
Edité par Berlin Springer International Publishing Springer Sep 2016, 2016
ISBN 10 : 3319386182 ISBN 13 : 9783319386188
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 99,98
Quantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit.Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again. 108 pp. Englisch.
Edité par Springer International Publishing Jan 2015, 2015
ISBN 10 : 3319135147 ISBN 13 : 9783319135144
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 106,99
Quantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit.Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again. 124 pp. Englisch.
Edité par Springer International Publishing, 2016
ISBN 10 : 3319386182 ISBN 13 : 9783319386188
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 87,21
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Examines stealthy peripheral-based attacks on host computersPresents a new approach to detecting such attacksOffers an innovative new runtime detector for malware detectionThis work addresses stealthy peripheral-based attac.
Edité par Springer International Publishing, 2015
ISBN 10 : 3319135147 ISBN 13 : 9783319135144
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 89,99
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Examines stealthy peripheral-based attacks on host computersPresents a new approach to detecting such attacksOffers an innovative new runtime detector for malware detectionThis work addresses stealthy peripheral-based attac.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 148,24
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand pp. 124.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 149,02
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand 126.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 148,16
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND pp. 124.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 148,89
Quantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND 126.
Edité par Springer International Publishing, 2015
ISBN 10 : 3319135147 ISBN 13 : 9783319135144
Langue: anglais
Vendeur : preigu, Osnabrück, Allemagne
EUR 93,45
Quantité disponible : 5 disponible(s)
Ajouter au panierBuch. Etat : Neu. Detecting Peripheral-based Attacks on the Host Memory | Patrick Stewin | Buch | xv | Englisch | 2015 | Springer International Publishing | EAN 9783319135144 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu Print on Demand.