Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hacking and penetration testing with...
~
Polstra, Philip,
Hacking and penetration testing with low power devices
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hacking and penetration testing with low power devicesPhilip Polstra ; technical editor, Vivek Ramachandran.
Author:
Polstra, Philip,
other author:
Ramachandran, Vivek,
Published:
Waltham, Massachusetts :Syngress,2015.
Description:
1 online resource (260 p.) :ill., tables, photographs.
Subject:
Penetration testing (Computer security)Equipment and supplies.
Online resource:
https://www.sciencedirect.com/science/book/9780128007518
ISBN:
9780128008249 (electronic bk.)
Hacking and penetration testing with low power devices
Polstra, Philip,
Hacking and penetration testing with low power devices
[electronic resource] /Philip Polstra ; technical editor, Vivek Ramachandran. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (260 p.) :ill., tables, photographs.
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
ISBN: 9780128008249 (electronic bk.)Subjects--Topical Terms:
872270
Penetration testing (Computer security)
--Equipment and supplies.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / .P5965 2015eb
Dewey Class. No.: 005.8
Hacking and penetration testing with low power devices
LDR
:02077cmm a2200265 a 4500
001
582192
006
o d
007
cnu|unuuu||
008
210121s2015 mauao o 000 0 eng d
020
$a
9780128008249 (electronic bk.)
020
$a
0128008245 (electronic bk.)
020
$a
0128007516
020
$a
9780128007518
035
$a
(OCoLC)891381766
035
$a
EL2020112
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
UMI
$d
CDX
$d
DEBBG
$d
DEBSZ
$d
WAU
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
VGM
$d
LIV
$d
OCLCQ
$d
OCLCF
$d
U3W
$d
D6H
$d
CEF
$d
YDXCP
$d
VT2
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
.P5965 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Polstra, Philip,
$e
author.
$3
872268
245
1 0
$a
Hacking and penetration testing with low power devices
$h
[electronic resource] /
$c
Philip Polstra ; technical editor, Vivek Ramachandran.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (260 p.) :
$b
ill., tables, photographs.
505
0
$a
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
520
$a
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Penetration testing (Computer security)
$x
Equipment and supplies.
$3
872270
650
0
$a
BeagleBone (Computer)
$3
755060
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Ramachandran, Vivek,
$e
editor.
$3
872269
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128007518
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000187035
電子館藏
1圖書
電子書
EB QA76.9.A25 .P5965 2015eb 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128007518
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login