Seven deadliest USB attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. Y...

Full description

Saved in:
Bibliographic Details
Main Authors: Anderson, Brian (Brian James)
Corporate Authors: Elsevier Science & Technology.
Published: Syngress,
Publisher Address: Burlington, MA :
Publication Dates: 2010.
Literature type: eBook
Language: English
Series: Syngress seven deadliest attacks series
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781597495530
Summary: Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdump Pod Slurping Social Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
Carrier Form: 1 online resource (xiv, 222 pages) : illustrations.
ISBN: 9781597495547
1597495549
Index Number: QA76
CLC: TP309-532
Contents: Introduction -- Chapter 1: USB Hacksaw -- Chapter 2: USB Switchblade -- Chapter 3: USB Based Virus / Malicious Code Launch -- Chapter 4: USB Device OverFlow -- Chapter 5: USB Ramdump -- Chapter 6: Podslurping-A USB Problem -- Chapter 7: Social Engineering and USB Come Together for a Brutal Attack.