skip to content
Unauthorised Access : Physical Penetration Testing For IT Security Teams. Preview this item
ClosePreview this item
Checking...

Unauthorised Access : Physical Penetration Testing For IT Security Teams.

Author: Wil Allsopp
Publisher: Hoboken : John Wiley & Sons, Ltd., 2010.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent.  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Allsopp, Wil.
Unauthorised Access : Physical Penetration Testing For IT Security Teams.
Hoboken : John Wiley & Sons, Ltd., ©2010
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Wil Allsopp
ISBN: 9780470682722 0470682728 9780470747612 0470747617
OCLC Number: 781257603
Description: 1 online resource (309 pages)
Contents: Unauthorised Access; Contents; Preface; Acknowledgements; Foreword; 1 The Basics of Physical Penetration Testing; 2 Planning Your Physical Penetration Tests; 3 Executing Tests; 4 An Introduction to Social Engineering Techniques; 5 Lock Picking; 6 Information Gathering; 7 Hacking Wireless Equipment; 8 Gathering the Right Equipment; 9 Tales from the Front Line; 10 Introducing Security Policy Concepts; 11 Counter Intelligence; Appendix A: Uk Law; Appendix B: Us Law; Appendix C: Eu Law; Appendix D: Security Clearances; Appendix E: Security Accreditations; Index.

Abstract:

A guide to planning and performing a physical penetration test on your computer's security. It guides you through the entire process from gathering intelligence, getting inside, dealing with threats,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/781257603<\/a>> # Unauthorised Access : Physical Penetration Testing For IT Security Teams.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"781257603<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Place\/hoboken<\/a>> ; # Hoboken<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872484<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh2008117728<\/a>> ; # Computer software--Reliability<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872601<\/a>> ; # Computer software--Testing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872585<\/a>> ; # Computer software--Reliability<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872341<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Topic\/computer_software_testing<\/a>> ; # Computer software--Testing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872451<\/a>> ; # Computer science<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/102981300<\/a>> ; # Wil Allsopp<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2010<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"The first guide to planning and performing a physical penetration test on your computer\'s securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in op.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Unauthorised Access; Contents; Preface; Acknowledgements; Foreword; 1 The Basics of Physical Penetration Testing; 2 Planning Your Physical Penetration Tests; 3 Executing Tests; 4 An Introduction to Social Engineering Techniques; 5 Lock Picking; 6 Information Gathering; 7 Hacking Wireless Equipment; 8 Gathering the Right Equipment; 9 Tales from the Front Line; 10 Introducing Security Policy Concepts; 11 Counter Intelligence; Appendix A: Uk Law; Appendix B: Us Law; Appendix C: Eu Law; Appendix D: Security Clearances; Appendix E: Security Accreditations; Index.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/797303472<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/797303472#CreativeWork\/unauthorised_access_physical_penetration_testing_for_it_security_teams<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Unauthorised Access : Physical Penetration Testing For IT Security Teams.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"781257603<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/781257603#PublicationEvent\/hoboken_john_wiley_&_sons_ltd_2010<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Agent\/john_wiley_&_sons_ltd<\/a>> ; # John Wiley & Sons, Ltd.<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.safaribooksonline.com\/9780470747612<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780470747612<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780470682722<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/781257603<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Agent\/john_wiley_&_sons_ltd<\/a>> # John Wiley & Sons, Ltd.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"John Wiley & Sons, Ltd.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Place\/hoboken<\/a>> # Hoboken<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hoboken<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Topic\/computer_software_testing<\/a>> # Computer software--Testing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85029534<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer software--Testing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh2008117728<\/a>> # Computer software--Reliability<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer software--Reliability<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872341<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872451<\/a>> # Computer science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer science<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872484<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872585<\/a>> # Computer software--Reliability<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer software--Reliability<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872601<\/a>> # Computer software--Testing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer software--Testing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/102981300<\/a>> # Wil Allsopp<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Allsopp<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Wil<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Wil Allsopp<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/797303472#CreativeWork\/unauthorised_access_physical_penetration_testing_for_it_security_teams<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Unauthorised Access : Physical Penetration Testing For IT Security Teams.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/781257603<\/a>> ; # Unauthorised Access : Physical Penetration Testing For IT Security Teams.<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780470682722<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0470682728<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780470682722<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780470747612<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0470747617<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780470747612<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/781257603<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/781257603<\/a>> ; # Unauthorised Access : Physical Penetration Testing For IT Security Teams.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-01-08<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/781257603#PublicationEvent\/hoboken_john_wiley_&_sons_ltd_2010<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Place\/hoboken<\/a>> ; # Hoboken<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/797303472#Agent\/john_wiley_&_sons_ltd<\/a>> ; # John Wiley & Sons, Ltd.<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2010<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n