Unauthorised access : (Record no. 9268)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01654nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100614.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780470747612 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9.A25 .A44 2009 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Allsopp, Wil. |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Unauthorised access : |
Remainder of title | physical penetration testing for IT security teams / |
Statement of responsibility, etc. | Wil Allsopp. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Chichester, England : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c2009 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xx, 287 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | PHP2328 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the Front Line -- 10. Introducing Security Policy Concepts -- 11. Counter Intelligence -- Appendix A. UK law -- Appendix B. US law -- Appendix C. EU law -- Appendix D. Security Clearances -- Appendix E. Security Accreditations. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER SECURITY -- TESTING |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Main | National University - Manila | General Circulation | 03/26/2014 | Purchased - C&E | 2328.00 | GC QA 76.9.A25 .A44 2009 | NULIB000007027 | 05/20/2025 | c.1 | 05/20/2025 | Books |