|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910968316303321 |
|
|
Autore |
Allsopp Wil |
|
|
Titolo |
Unauthorised access : physical penetration testing for IT security teams / / Wil Allsopp |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, : Wiley, 2009 |
|
|
|
|
|
|
|
ISBN |
|
9786612354878 |
9780470970027 |
0470970022 |
9781282354876 |
1282354876 |
9780470682722 |
0470682728 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (309 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Local area networks (Computer networks) - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Unauthorised Access; Contents; Preface; Acknowledgements; Foreword; 1 The Basics of Physical Penetration Testing; 2 Planning Your Physical Penetration Tests; 3 Executing Tests; 4 An Introduction to Social Engineering Techniques; 5 Lock Picking; 6 Information Gathering; 7 Hacking Wireless Equipment; 8 Gathering the Right Equipment; 9 Tales from the Front Line; 10 Introducing Security Policy Concepts; 11 Counter Intelligence; Appendix A: UK Law; Appendix B: US Law; Appendix C: EU Law; Appendix D: Security Clearances; Appendix E: Security Accreditations; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical |
|
|
|
|