語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject:"Penetration testing (Computer security)- Equipment and supplies." ]
切換:
標籤
|
MARC模式
|
ISBD
Hacking and penetration testing with...
~
Polstra, Philip,
FindBook
Google Book
Amazon
博客來
Hacking and penetration testing with low power devices
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hacking and penetration testing with low power devices/ Philip Polstra ; technical editor, Vivek Ramachandran.
作者:
Polstra, Philip,
其他作者:
Ramachandran, Vivek,
出版者:
Waltham, Massachusetts :Syngress, : 2015.,
面頁冊數:
1 online resource (260 p.) :ill., tables, photographs.
內容註:
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
標題:
Penetration testing (Computer security) - Equipment and supplies. -
電子資源:
https://www.sciencedirect.com/science/book/9780128007518
ISBN:
9780128008249 (electronic bk.)
Hacking and penetration testing with low power devices
Polstra, Philip,
Hacking and penetration testing with low power devices
[electronic resource] /Philip Polstra ; technical editor, Vivek Ramachandran. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (260 p.) :ill., tables, photographs.
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
ISBN: 9780128008249 (electronic bk.)Subjects--Topical Terms:
3462766
Penetration testing (Computer security)
--Equipment and supplies.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: QA76.9.A25 / .P5965 2015eb
Dewey Class. No.: 005.8
Hacking and penetration testing with low power devices
LDR
:02077cmm a2200265 a 4500
001
2223382
006
o d
007
cnu|unuuu||
008
210114s2015 mauao o 000 0 eng d
020
$a
9780128008249 (electronic bk.)
020
$a
0128008245 (electronic bk.)
020
$a
0128007516
020
$a
9780128007518
035
$a
(OCoLC)891381766
035
$a
EL2020112
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
UMI
$d
CDX
$d
DEBBG
$d
DEBSZ
$d
WAU
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
VGM
$d
LIV
$d
OCLCQ
$d
OCLCF
$d
U3W
$d
D6H
$d
CEF
$d
YDXCP
$d
VT2
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
.P5965 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Polstra, Philip,
$e
author.
$3
3462764
245
1 0
$a
Hacking and penetration testing with low power devices
$h
[electronic resource] /
$c
Philip Polstra ; technical editor, Vivek Ramachandran.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (260 p.) :
$b
ill., tables, photographs.
505
0
$a
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
520
$a
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Penetration testing (Computer security)
$x
Equipment and supplies.
$3
3462766
650
0
$a
BeagleBone (Computer)
$3
2204975
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Ramachandran, Vivek,
$e
editor.
$3
3462765
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128007518
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9395913
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 .P5965 2015eb
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入