Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hacking and penetration testing with...
~
Polstra, Philip,
Linked to FindBook
Google Book
Amazon
博客來
Hacking and penetration testing with low power devices
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hacking and penetration testing with low power devices/ Philip Polstra ; technical editor, Vivek Ramachandran.
Author:
Polstra, Philip,
other author:
Ramachandran, Vivek,
Published:
Waltham, Massachusetts :Syngress, : 2015.,
Description:
1 online resource (260 p.) :ill., tables, photographs.
[NT 15003449]:
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
Subject:
Penetration testing (Computer security) - Equipment and supplies. -
Online resource:
https://www.sciencedirect.com/science/book/9780128007518
ISBN:
9780128008249 (electronic bk.)
Hacking and penetration testing with low power devices
Polstra, Philip,
Hacking and penetration testing with low power devices
[electronic resource] /Philip Polstra ; technical editor, Vivek Ramachandran. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (260 p.) :ill., tables, photographs.
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
ISBN: 9780128008249 (electronic bk.)Subjects--Topical Terms:
3462766
Penetration testing (Computer security)
--Equipment and supplies.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / .P5965 2015eb
Dewey Class. No.: 005.8
Hacking and penetration testing with low power devices
LDR
:02077cmm a2200265 a 4500
001
2223382
006
o d
007
cnu|unuuu||
008
210114s2015 mauao o 000 0 eng d
020
$a
9780128008249 (electronic bk.)
020
$a
0128008245 (electronic bk.)
020
$a
0128007516
020
$a
9780128007518
035
$a
(OCoLC)891381766
035
$a
EL2020112
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
UMI
$d
CDX
$d
DEBBG
$d
DEBSZ
$d
WAU
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
VGM
$d
LIV
$d
OCLCQ
$d
OCLCF
$d
U3W
$d
D6H
$d
CEF
$d
YDXCP
$d
VT2
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
.P5965 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Polstra, Philip,
$e
author.
$3
3462764
245
1 0
$a
Hacking and penetration testing with low power devices
$h
[electronic resource] /
$c
Philip Polstra ; technical editor, Vivek Ramachandran.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (260 p.) :
$b
ill., tables, photographs.
505
0
$a
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
520
$a
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Penetration testing (Computer security)
$x
Equipment and supplies.
$3
3462766
650
0
$a
BeagleBone (Computer)
$3
2204975
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Ramachandran, Vivek,
$e
editor.
$3
3462765
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128007518
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9395913
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 .P5965 2015eb
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login