Library Logo

Hacking and penetration testing with low power devices / (Record no. 246961)

000 -LEADER
fixed length control field 02907cam a2200445Ii 4500
001 - CONTROL NUMBER
control field ocn891381766
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114808.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140912t20152015mauao o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency E7B
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency E7B
Modifying agency OCLCO
-- UIU
-- UMI
-- CDX
-- DEBBG
-- DEBSZ
-- WAU
-- STF
-- B24X7
-- COO
-- OCLCQ
-- VGM
-- LIV
-- OCLCQ
-- OCLCF
-- U3W
-- D6H
-- CEF
-- YDXCP
019 ## -
-- 893436790
-- 902702485
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128008249
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128008245
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128007516
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128007518
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128007518
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)891381766
Canceled/invalid control number (OCoLC)893436790
-- (OCoLC)902702485
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .P5965 2015eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Polstra, Philip,
Relator term author.
245 10 - TITLE STATEMENT
Title Hacking and penetration testing with low power devices /
Medium [electronic resource]
Statement of responsibility, etc. Philip Polstra ; technical editor, Vivek Ramachandran.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Waltham, Massachusetts :
Name of producer, publisher, distributor, manufacturer Syngress,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (260 pages) :
Other physical details illustrations, tables, photographs
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
520 ## - SUMMARY, ETC.
Summary, etc. This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
Assigning source Edited summary from book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
General subdivision Equipment and supplies.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BeagleBone (Computer)
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BeagleBone (Computer)
Source of heading or term fast
Authority record control number (OCoLC)fst01909280
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ramachandran, Vivek,
Relator term editor.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Polstra, Philip.
Title Hacking and penetration testing with low power devices.
Place, publisher, and date of publication Waltham, MA : Syngress, [2015]
International Standard Book Number 9780128007518
Record control number (DLC) 2014027430
-- (OCoLC)883962651
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128007518

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login