Unauthorised access: physical penetration testing for IT security teams
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester, West Sussex
Wiley
2009
|
Schlagworte: | |
Beschreibung: | "Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page |
Beschreibung: | xx, 287 S. Ill., graph. Darst. |
ISBN: | 9780470747612 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042774128 | ||
003 | DE-604 | ||
005 | 20151013 | ||
007 | t | ||
008 | 150824s2009 sz ad|| |||| 00||| eng d | ||
020 | |a 9780470747612 |c pbk. |9 978-0-470-74761-2 | ||
035 | |a (OCoLC)699140035 | ||
035 | |a (DE-599)BVBBV042774128 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-91G | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Allsopp, Wil |e Verfasser |4 aut | |
245 | 1 | 0 | |a Unauthorised access |b physical penetration testing for IT security teams |c Wil Allsopp |
264 | 1 | |a Chichester, West Sussex |b Wiley |c 2009 | |
300 | |a xx, 287 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page | ||
650 | 4 | |a Computer security / Testing | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028204335 |
Datensatz im Suchindex
_version_ | 1804175000162271232 |
---|---|
any_adam_object | |
author | Allsopp, Wil |
author_facet | Allsopp, Wil |
author_role | aut |
author_sort | Allsopp, Wil |
author_variant | w a wa |
building | Verbundindex |
bvnumber | BV042774128 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)699140035 (DE-599)BVBBV042774128 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01550nam a2200349zc 4500</leader><controlfield tag="001">BV042774128</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151013 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150824s2009 sz ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470747612</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-470-74761-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699140035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042774128</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Allsopp, Wil</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unauthorised access</subfield><subfield code="b">physical penetration testing for IT security teams</subfield><subfield code="c">Wil Allsopp</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester, West Sussex</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 287 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028204335</subfield></datafield></record></collection> |
id | DE-604.BV042774128 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:09:19Z |
institution | BVB |
isbn | 9780470747612 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028204335 |
oclc_num | 699140035 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | xx, 287 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Allsopp, Wil Verfasser aut Unauthorised access physical penetration testing for IT security teams Wil Allsopp Chichester, West Sussex Wiley 2009 xx, 287 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier "Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data"--Resource description page Computer security / Testing Computer networks / Security measures Penetrationstest (DE-588)4825817-9 gnd rswk-swf Penetrationstest (DE-588)4825817-9 s DE-604 |
spellingShingle | Allsopp, Wil Unauthorised access physical penetration testing for IT security teams Computer security / Testing Computer networks / Security measures Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)4825817-9 |
title | Unauthorised access physical penetration testing for IT security teams |
title_auth | Unauthorised access physical penetration testing for IT security teams |
title_exact_search | Unauthorised access physical penetration testing for IT security teams |
title_full | Unauthorised access physical penetration testing for IT security teams Wil Allsopp |
title_fullStr | Unauthorised access physical penetration testing for IT security teams Wil Allsopp |
title_full_unstemmed | Unauthorised access physical penetration testing for IT security teams Wil Allsopp |
title_short | Unauthorised access |
title_sort | unauthorised access physical penetration testing for it security teams |
title_sub | physical penetration testing for IT security teams |
topic | Computer security / Testing Computer networks / Security measures Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Computer security / Testing Computer networks / Security measures Penetrationstest |
work_keys_str_mv | AT allsoppwil unauthorisedaccessphysicalpenetrationtestingforitsecurityteams |