Unauthorised access : physical penetration testing for IT security teams / Wil Allsopp.
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Main | National University - Manila | CCIT | General Circulation | GC QA 76.9.A25 .A44 2009 (Browse shelf (Opens below)) | c.1 | Available | NULIB000007027 |
Browsing National University - Manila shelves, Shelving location: General Circulation Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 .E46 2015 Emotion recognition: a pattern analysis approach / | GC QA 76.9 .H64 2010 Century 21 computer applications & keyboarding / | GC QA 76.9 .P48 2017 c.1 Microsoft SQL Server 2016 : a beginner's guide | GC QA 76.9.A25 .A44 2009 Unauthorised access : physical penetration testing for IT security teams / | GC QA 76.9.A25 .G65 1999 Computer security / | GC QA 76.9.A25 .V36 2006 Digital rights management / | GC QA 76.9.A43 .G87 [2012] Algorithm analysis and design / |
Includes index.
1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the Front Line -- 10. Introducing Security Policy Concepts -- 11. Counter Intelligence -- Appendix A. UK law -- Appendix B. US law -- Appendix C. EU law -- Appendix D. Security Clearances -- Appendix E. Security Accreditations.
"Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page.
There are no comments on this title.