Limit search to available items
Book Cover
E-book
Author Hagar, Jon Duncan

Title Software test attacks to break mobile and embedded devices / Jon Duncan Hagar
Published Boca Raton : Taylor & Francis, 2013

Copies

Description 1 online resource
Series Chapman & Hall/CRC Innovations in Software Engineering
Chapman & Hall/CRC Innovations in Software Engineering
Contents Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks
Chapter 9: Mobile/Embedded SecurityChapter 10: Generic Attacks; Chapter 11: Mobile and Embedded System Labs; Chapter 12: Some Parting Advice; Appendix A: Mobile and Embedded Error Taxonomy: A Software Error Taxonomy (for Testers); Appendix B: Mobile and Embedded Coding Rules; Appendix C: Quality First: "Defending the Source Code So That Attacks Are Not So Easy"; Appendix D: Basic Timing Concepts; Appendix E: Detailed Mapping of Attacks; Appendix F: UI/GUI and Game Evaluation Checklist; Appendix G: Risk Analysis, FMEA, and Brainstorming; References; Glossary; Back Cover
Summary Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Penetration testing (Computer security)
Mobile computing -- Security measures
Embedded computer systems -- Security measures
COMPUTERS -- Software Development & Engineering -- General.
COMPUTERS -- Security -- General.
MATHEMATICS -- General.
Penetration testing (Computer security)
Form Electronic book
ISBN 146657531X
9781466575318
9780429071911
0429071914