Unauthorised access physical penetration testing for IT security teams
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of ne...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Chichester :
Wiley
2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627727106719 |
Tabla de Contenidos:
- Unauthorised Access; Contents; Preface; Acknowledgements; Foreword; 1 The Basics of Physical Penetration Testing; 2 Planning Your Physical Penetration Tests; 3 Executing Tests; 4 An Introduction to Social Engineering Techniques; 5 Lock Picking; 6 Information Gathering; 7 Hacking Wireless Equipment; 8 Gathering the Right Equipment; 9 Tales from the Front Line; 10 Introducing Security Policy Concepts; 11 Counter Intelligence; Appendix A: UK Law; Appendix B: US Law; Appendix C: EU Law; Appendix D: Security Clearances; Appendix E: Security Accreditations; Index