|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1142524939 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
200307s2020 inu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d RECBK
|d UKMGB
|d OCLCO
|d N$T
|d UKAHL
|d OCLCQ
|d OCLCF
|d YDXIT
|d DG1
|d OCLCQ
|d OCLCO
|d IEEEE
|d TEFOD
|d K6U
|d OCLCQ
|d UPM
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBC013531
|2 bnb
|
016 |
7 |
|
|a 019690857
|2 Uk
|
020 |
|
|
|a 9781119491774
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 1119491770
|q (electronic bk. ;
|q oBook)
|
020 |
|
|
|a 9781119491736
|q (electronic book)
|
020 |
|
|
|a 1119491738
|q (electronic book)
|
020 |
|
|
|a 9781119491781
|q (electronic book)
|
020 |
|
|
|a 1119491789
|q (electronic book)
|
020 |
|
|
|z 9781119491804
|q (paperback)
|
024 |
7 |
|
|a 10.1002/9781119491774
|2 doi
|
029 |
1 |
|
|a AU@
|b 000067253991
|
029 |
1 |
|
|a UKMGB
|b 019690857
|
035 |
|
|
|a (OCoLC)1142524939
|
037 |
|
|
|a 9781119491736
|b Wiley
|
037 |
|
|
|a 9820810
|b IEEE
|
037 |
|
|
|a B847C5AB-35DB-47E6-A3FC-F92841002A03
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TL152.8
|b .K65 2020
|
082 |
0 |
4 |
|a 629.04/6
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Knight, Alissa,
|e author.
|
245 |
1 |
0 |
|a Hacking connected cars :
|b tactics, techniques, and procedures /
|c Alissa Knight.
|
264 |
|
1 |
|a Indianapolis, Indiana :
|b John Wiley & Sons, Inc.,
|c [2020]
|
300 |
|
|
|a 1 online resource (xxxiii, 238 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
8 |
|
|a Cover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers
|
505 |
8 |
|
|a Rules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance
|
520 |
|
|
|a Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC
|
505 |
8 |
|
|a Bringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing
|
505 |
8 |
|
|a Filesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive
|
500 |
|
|
|a VANET
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on June 09, 2020).
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Automated vehicles.
|
650 |
|
0 |
|a Automated vehicles
|x Security measures.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Véhicules autonomes.
|
650 |
|
6 |
|a Véhicules autonomes
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography & Encryption.
|2 bisacsh
|
650 |
|
7 |
|a Automated vehicles
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
758 |
|
|
|i has work:
|a Hacking connected cars (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGp63Dv9h6qby7j8tFFvpd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Knight, Alissa.
|t Hacking Connected Cars : Tactics, Techniques, and Procedures.
|d Newark : John Wiley & Sons, Incorporated, ©2020
|z 9781119491804
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6119409
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33784299
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33784300
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6119409
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2378823
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00812470
|
994 |
|
|
|a 92
|b IZTAP
|