Part VI: Exotic Objects for Insertion

Chapter List

Chapter 29: Attacking Bluetooth
Chapter 30: Economizing on GPRS
Chapter 31: Legends and Myths about Flashing BIOS
Chapter 32: Viruses Infecting BIOS

Part Overview

What can become a target for attack besides workstations and servers? Potential targets are numerous . These are wireless networks, cellular phones, BIOS, and more whatever can attract hackers' attention!



Shellcoder's Programming Uncovered
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net