Unauthorised access : physical penetration testing for IT security teams / Wil Allsopp.
Material type:
- 9780470747612
- QA 76.9.A25 .A44 2009

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Gen. Ed. - CCIT | GC QA 76.9.A25 .A44 2009 (Browse shelf(Opens below)) | c.1 | Available | NULIB000007027 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Gen. Ed. - CCIT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
||
GC QA 76.9 .S44 2015 Patterns of HCI design and HCI design of patterns / | GC QA 76.9 .S54 2009 Systems analysis and design methods / | GC QA 76.9.A7 .S25 [2011] Computer system architecture and organisation / | GC QA 76.9.A25 .A44 2009 Unauthorised access : physical penetration testing for IT security teams / | GC QA 76.9.A25 .G65 1999 Computer security / | GC QA 76.9.A25 .V36 2006 Digital rights management / | GC QA 76.9.A43 .G87 [2012] Algorithm analysis and design / |
Includes index.
1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the Front Line -- 10. Introducing Security Policy Concepts -- 11. Counter Intelligence -- Appendix A. UK law -- Appendix B. US law -- Appendix C. EU law -- Appendix D. Security Clearances -- Appendix E. Security Accreditations.
"Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page.
There are no comments on this title.