|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn891381766 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140912t20152015mauao o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d UIU
|d UMI
|d CDX
|d DEBBG
|d DEBSZ
|d WAU
|d STF
|d B24X7
|d COO
|d OCLCQ
|d VGM
|d LIV
|d OCLCQ
|d OCLCF
|d U3W
|d D6H
|d CEF
|d YDXCP
|d VT2
|d OCLCO
|d OCLCQ
|d INARC
|
019 |
|
|
|a 893436790
|a 902702485
|
020 |
|
|
|a 9780128008249
|q (e-book)
|
020 |
|
|
|a 0128008245
|q (e-book)
|
020 |
|
|
|a 0128007516
|
020 |
|
|
|a 9780128007518
|
020 |
|
|
|z 9780128007518
|
029 |
1 |
|
|a AU@
|b 000057232222
|
029 |
1 |
|
|a CHNEW
|b 000696825
|
029 |
1 |
|
|a CHNEW
|b 000696826
|
029 |
1 |
|
|a CHNEW
|b 001026534
|
029 |
1 |
|
|a DEBBG
|b BV042182833
|
029 |
1 |
|
|a DEBSZ
|b 417235224
|
029 |
1 |
|
|a DEBSZ
|b 434139378
|
035 |
|
|
|a (OCoLC)891381766
|z (OCoLC)893436790
|z (OCoLC)902702485
|
037 |
|
|
|a CL0500000490
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b .P5965 2015eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Polstra, Philip,
|e author.
|
245 |
1 |
0 |
|a Hacking and penetration testing with low power devices /
|c Philip Polstra ; technical editor, Vivek Ramachandran.
|
264 |
|
1 |
|a Waltham, Massachusetts :
|b Syngress,
|c 2015.
|
264 |
|
4 |
|c Ã2015
|
300 |
|
|
|a 1 online resource (260 pages) :
|b illustrations, tables, photographs
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
|
520 |
|
|
|a This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
|c Edited summary from book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|x Equipment and supplies.
|
650 |
|
0 |
|a BeagleBone (Computer)
|
650 |
|
6 |
|a BeagleBone (Ordinateur)
|
650 |
|
7 |
|a BeagleBone (Computer)
|2 fast
|0 (OCoLC)fst01909280
|
700 |
1 |
|
|a Ramachandran, Vivek,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|a Polstra, Philip.
|t Hacking and penetration testing with low power devices.
|d Waltham, MA : Syngress, [2015]
|z 9780128007518
|w (DLC) 2014027430
|w (OCoLC)883962651
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128007518/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n hackingpenetrati0000pols
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00078669
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 29748403
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10927431
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12061083
|
994 |
|
|
|a 92
|b IZTAP
|