Unauthorised access : physical penetration testing for IT security teams /
"Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire pro...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Chichester, West Sussex, U.K. :
Wiley,
©2009.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn608489637 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 100422s2009 enka o 001 0 eng d | ||
010 | |a 2010487083 | ||
040 | |a UMI |b eng |e pn |c UMI |d N$T |d YDXCP |d IDEBK |d CEF |d E7B |d OCLCQ |d CSU |d OCLCQ |d DEBSZ |d OCLCQ |d TEFOD |d OCLCQ |d EBLCP |d MERUC |d CDX |d UKDOC |d OCLCF |d MND |d DKDLA |d TEFOD |d OCLCQ |d COO |d OCLCQ |d COCUF |d CNNOR |d Z5A |d MOR |d PIFAG |d ZCU |d OCLCQ |d U3W |d OCLCA |d OCL |d BRL |d STF |d WRM |d OCLCQ |d NRAMU |d ICG |d INT |d VT2 |d AU@ |d OCLCQ |d WYU |d OCLCQ |d UAB |d A6Q |d DKC |d OCLCQ |d UKAHL |d UKCRE |d LDP |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBA9B2493 |2 bnb | ||
016 | 7 | |a 015401959 |2 Uk | |
019 | |a 507428592 |a 536144019 |a 609849278 |a 646819503 |a 649830171 |a 719419749 |a 740994458 |a 816342084 |a 861929201 |a 961488114 |a 962680780 |a 988473281 |a 992001161 |a 1037514867 |a 1037906703 |a 1038655044 |a 1045514178 |a 1055405508 |a 1057984029 |a 1064082243 |a 1081233138 |a 1083602449 |a 1103256840 |a 1129373006 |a 1153020228 | ||
020 | |a 9780470682722 |q (electronic bk.) | ||
020 | |a 0470682728 |q (electronic bk.) | ||
020 | |a 9780470970027 |q (electronic bk.) | ||
020 | |a 0470970022 |q (electronic bk.) | ||
020 | |a 1282354876 | ||
020 | |a 9781282354876 | ||
020 | |z 0470747617 | ||
020 | |z 9780470747612 | ||
029 | 1 | |a AU@ |b 000046054355 | |
029 | 1 | |a AU@ |b 000053263562 | |
029 | 1 | |a CDX |b 11415446 | |
029 | 1 | |a DEBBG |b BV044140056 | |
029 | 1 | |a DEBSZ |b 355418789 | |
029 | 1 | |a DEBSZ |b 372818013 | |
029 | 1 | |a DEBSZ |b 396312098 | |
029 | 1 | |a HEBIS |b 291490689 | |
029 | 1 | |a NZ1 |b 13536769 | |
029 | 1 | |a NZ1 |b 14241995 | |
029 | 1 | |a AU@ |b 000066750504 | |
035 | |a (OCoLC)608489637 |z (OCoLC)507428592 |z (OCoLC)536144019 |z (OCoLC)609849278 |z (OCoLC)646819503 |z (OCoLC)649830171 |z (OCoLC)719419749 |z (OCoLC)740994458 |z (OCoLC)816342084 |z (OCoLC)861929201 |z (OCoLC)961488114 |z (OCoLC)962680780 |z (OCoLC)988473281 |z (OCoLC)992001161 |z (OCoLC)1037514867 |z (OCoLC)1037906703 |z (OCoLC)1038655044 |z (OCoLC)1045514178 |z (OCoLC)1055405508 |z (OCoLC)1057984029 |z (OCoLC)1064082243 |z (OCoLC)1081233138 |z (OCoLC)1083602449 |z (OCoLC)1103256840 |z (OCoLC)1129373006 |z (OCoLC)1153020228 | ||
037 | |a CL0500000064 |b Safari Books Online | ||
037 | |a 787D6CCA-5077-4EED-848D-7BC0599F920D |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a K |2 bicssc | |
082 | 0 | 4 | |a 004 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Allsopp, Wil. | |
245 | 1 | 0 | |a Unauthorised access : |b physical penetration testing for IT security teams / |c Wil Allsopp. |
246 | 3 | |a Unauthorized access | |
246 | 3 | 0 | |a Physical penetration testing for IT security teams |
260 | |a Chichester, West Sussex, U.K. : |b Wiley, |c ©2009. | ||
300 | |a 1 online resource (xx, 287 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a "Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page. | ||
505 | 0 | |a 1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the Front Line -- 10. Introducing Security Policy Concepts -- 11. Counter Intelligence -- Appendix A. UK law -- Appendix B. US law -- Appendix C. EU law -- Appendix D. Security Clearances -- Appendix E. Security Accreditations. | |
588 | 0 | |a Print version record. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security |x Testing. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Testing. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer networking & communications. |2 thema | |
650 | 7 | |a Network security. |2 thema | |
650 | 7 | |a Computer security. |2 thema | |
650 | 7 | |a Computers and IT. |2 ukslc | |
758 | |i has work: |a Unauthorised access (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGrHgTQ9GHCcKhHTcJXrYK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Allsopp, Wil. |t Unauthorised access. |d Chichester, West Sussex, U.K. : Wiley, ©2009 |z 9780470747612 |w (OCoLC)419866397 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780470747612/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=470412 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH13356510 | ||
938 | |a 123Library |b 123L |n 11855 | ||
938 | |a Coutts Information Services |b COUT |n 11415446 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL470412 | ||
938 | |a ebrary |b EBRY |n ebr10325810 | ||
938 | |a EBSCOhost |b EBSC |n 289256 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 235487 | ||
938 | |a YBP Library Services |b YANK |n 3092303 | ||
938 | |a YBP Library Services |b YANK |n 12668137 | ||
994 | |a 92 |b IZTAP |