Cover of Unauthorised Access QA0076.90000000.A25A55 2009
Recommended

Unauthorised Access

by Wil Allsopp

✓ Read

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is

First published 2009 326 pages
Category
Mathematics
Priority
Recommended
Author works
1
Editions known
5
Classification
DDC 005.8 LCC QA-0076.90000000.A25A55 2009 Computer networksComputer networks, security measuresComputer networks--security measuresComputer securityComputer security--testingComputer softwarePenetration testing (Computer security)Qa76.9.a25 a456 2009
This edition
ISBN 9780470747612 English
FROM THE STACKS Returned · Read

On the Same Shelf

Books one call-number away from QA0076.90000000.A25A55 2009 in the LCC stacks.

More in Mathematics


← Back to browse