000 | 02907cam a2200445Ii 4500 | ||
---|---|---|---|
001 | ocn891381766 | ||
003 | OCoLC | ||
005 | 20190328114808.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 140912t20152015mauao o 001 0 eng d | ||
040 |
_aE7B _beng _erda _epn _cE7B _dOCLCO _dUIU _dUMI _dCDX _dDEBBG _dDEBSZ _dWAU _dSTF _dB24X7 _dCOO _dOCLCQ _dVGM _dLIV _dOCLCQ _dOCLCF _dU3W _dD6H _dCEF _dYDXCP |
||
019 |
_a893436790 _a902702485 |
||
020 |
_a9780128008249 _q(e-book) |
||
020 |
_a0128008245 _q(e-book) |
||
020 | _a0128007516 | ||
020 | _a9780128007518 | ||
020 | _z9780128007518 | ||
035 |
_a(OCoLC)891381766 _z(OCoLC)893436790 _z(OCoLC)902702485 |
||
050 | 4 |
_aQA76.9.A25 _b.P5965 2015eb |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aPolstra, Philip, _eauthor. |
|
245 | 1 | 0 |
_aHacking and penetration testing with low power devices / _h[electronic resource] _cPhilip Polstra ; technical editor, Vivek Ramachandran. |
264 | 1 |
_aWaltham, Massachusetts : _bSyngress, _c2015. |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource (260 pages) : _billustrations, tables, photographs |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aPrint version record. | |
505 | 0 | _aMeet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions. | |
520 |
_aThis book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. -- _cEdited summary from book. |
||
650 | 0 |
_aPenetration testing (Computer security) _xEquipment and supplies. |
|
650 | 0 | _aBeagleBone (Computer) | |
650 | 7 |
_aBeagleBone (Computer) _2fast _0(OCoLC)fst01909280 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aRamachandran, Vivek, _eeditor. |
|
776 | 0 | 8 |
_iPrint version: _aPolstra, Philip. _tHacking and penetration testing with low power devices. _dWaltham, MA : Syngress, [2015] _z9780128007518 _w(DLC) 2014027430 _w(OCoLC)883962651 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128007518 |
999 |
_c246961 _d246961 |