Unauthorised access physical penetration testing for IT security teams
1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Chichester
Wiley
2009
|
Schlagworte: | |
Online Zugang: | Verlagsangaben Inhaltsverzeichnis Cover |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | 1. Basics of Physical Penetration Testing -- 2. Planning Your Physical Penetration Tests -- 3. Executing Tests -- 4. Introduction to Social Engineering Techniques -- 5. Lock Picking -- 6. Information Gathering -- 7. Hacking Wireless Equipment -- 8. Gathering the Right Equipment -- 9. Tales from the Front Line -- 10. Introducing Security Policy Concepts -- 11. Counter Intelligence -- Appendix A. UK law -- Appendix B. US law -- Appendix C. EU law -- Appendix D. Security Clearances -- Appendix E. Security Accreditations. |
---|---|
Beschreibung: | XX, 287 S Ill |
ISBN: | 9780470747612 978-0-470-74761-2 |