Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hacking and penetration testing with...
~
Ramachandran, Vivek,
Hacking and penetration testing with low power devices
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Hacking and penetration testing with low power devices/ Philip Polstra ; technical editor, Vivek Ramachandran.
Author:
Polstra, Philip,
other author:
Ramachandran, Vivek,
Published:
Waltham, Massachusetts :Syngress, : 2015.,
Description:
1 online resource (260 p.) :ill., tables, photographs. :
Subject:
Penetration testing (Computer security) - Equipment and supplies. -
Online resource:
https://www.sciencedirect.com/science/book/9780128007518
ISBN:
9780128008249 (electronic bk.)
Hacking and penetration testing with low power devices
Polstra, Philip,
Hacking and penetration testing with low power devices
[electronic resource] /Philip Polstra ; technical editor, Vivek Ramachandran. - Waltham, Massachusetts :Syngress,2015. - 1 online resource (260 p.) :ill., tables, photographs.
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
ISBN: 9780128008249 (electronic bk.)Subjects--Topical Terms:
1028025
Penetration testing (Computer security)
--Equipment and supplies.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / .P5965 2015eb
Dewey Class. No.: 005.8
Hacking and penetration testing with low power devices
LDR
:02077cam a2200265 a 4500
001
1000293
006
o d
007
cnu|unuuu||
008
201225s2015 mauao o 000 0 eng d
020
$a
9780128008249 (electronic bk.)
020
$a
0128008245 (electronic bk.)
020
$a
0128007516
020
$a
9780128007518
035
$a
(OCoLC)891381766
035
$a
EL2020112
040
$a
E7B
$b
eng
$c
E7B
$d
OCLCO
$d
UIU
$d
UMI
$d
CDX
$d
DEBBG
$d
DEBSZ
$d
WAU
$d
STF
$d
B24X7
$d
COO
$d
OCLCQ
$d
VGM
$d
LIV
$d
OCLCQ
$d
OCLCF
$d
U3W
$d
D6H
$d
CEF
$d
YDXCP
$d
VT2
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
.P5965 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Polstra, Philip,
$e
author.
$3
1292647
245
1 0
$a
Hacking and penetration testing with low power devices
$h
[electronic resource] /
$c
Philip Polstra ; technical editor, Vivek Ramachandran.
260
$a
Waltham, Massachusetts :
$b
Syngress,
$c
2015.
300
$a
1 online resource (260 p.) :
$b
ill., tables, photographs.
505
0
$a
Meet the deck -- Meet the Beagles -- Installing a base operating system -- Filling the toolbox -- Powering the deck -- Input and output devices -- Building an army of devices -- Keeping your army secret -- Adding air support -- Future directions.
520
$a
This book shows how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of low-cost devices from distances of a mile or more. Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. Devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, that can run for days or weeks on batteries due to their low power consumption, are discussed. You will also learn how to configure and use open-source tools, and how to leverage IEEE 802.15.4 networking to perform penetration tests from up to a mile away, or use 802.15.4 gateways to perform pen tests from anywhere in the world. --
$c
Edited summary from book.
588
0
$a
Print version record.
650
0
$a
Penetration testing (Computer security)
$x
Equipment and supplies.
$3
1028025
650
0
$a
BeagleBone (Computer)
$3
1028026
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Ramachandran, Vivek,
$e
editor.
$3
1292648
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128007518
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login