Unauthorised Access and over one million other books are available for Amazon Kindle. Learn more
Buy New
$24.41
Qty:1
  • List Price: $45.00
  • Save: $20.59 (46%)
FREE Shipping on orders over $35.
Only 6 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Want it Tuesday, April 22? Order within and choose One-Day Shipping at checkout. Details
Trade in your item
Get a $5.87
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Unauthorised Access: Physical Penetration Testing For IT Security Teams Paperback

ISBN-13: 978-0470747612 ISBN-10: 0470747617 Edition: 1st

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from Collectible from
Kindle
"Please retry"
Paperback
"Please retry"
$24.41
$19.86 $19.74

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Unauthorised Access: Physical Penetration Testing For IT Security Teams + The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers + The Art of Deception: Controlling the Human Element of Security
Price for all three: $45.41

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 302 pages
  • Publisher: Wiley; 1 edition (September 29, 2009)
  • Language: English
  • ISBN-10: 0470747617
  • ISBN-13: 978-0470747612
  • Product Dimensions: 9.1 x 7.3 x 0.7 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #375,972 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

In this book Wil Allsopp has created a thorough reference for those looking to advance into the area of physical penetration testing. The book also serves as a guidebook for in-house security managers seeking to institute better policy safeguards.” – From the Foreword, by Kevin Mitnick

Most IT security teams concentrate on keeping networks and systems safe from the outside – usually with the entire focus on firewalls, server configuration, application security, intrusion detection systems, and the like. But what if your attacker was on the inside? What if they were sitting at an employee’s computer, or placing a wireless access point hidden in a wiring closet or even roaming inside your server room?

Unauthorised Access provides the first guide to planning and performing physical penetration tests. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight) and getting access to networks and data. Learn to think like an attacker with topics that include:

  • Types of target vs level of anticipated response
  •  Dealing with guards
  •  Intelligence tradecraft, satellite imagery and in depth information gathering
  •  Planting bugs and covert wireless access points
  •  Hacking security cameras
  •  Strategic, tactical and operational planning
  •  Defeating locks, electronic keypads and other electronic access systems
  •  Social engineering - the weakest link
  •  Using your “Get Out of Jail Free” card
  •  Complying with local laws
  •  Attacking wireless networks

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.4 out of 5 stars
5 star
3
4 star
4
3 star
0
2 star
0
1 star
0
See all 7 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

6 of 7 people found the following review helpful By Lev Eriksson on November 6, 2009
Format: Paperback
Unauthorised Access is nothing short of a manual for corporate espionage. Author Wil Allsopp, is a "penetration tester", a hired gun brought in by companies to find out how effective the security defences protecting their premises are.

While conventional penetration testing ("pentesting") involves remote hacking, typically through software vulnerabilities, physical pen-testers gain access to a company's offices or data centre with the goal of connecting to a restricted network, planting a bug or even an imitation explosive device

With ten years experience as a pen-tester, Allsopp offers superb insight into common methods used by criminals to manipulate employees, from phone calls to outright espionage. The chapter on social engineering, in particular, is guaranteed to spark paranoia and sleepless nights among even the most grizzled chief security officers.

Specific tactics he reveals include employing politeness, inducing fear, faking supplication, invoking authority, ingratiation and deference, and even sexual manipulation.

Another chapter details several successful pen-tests conducted by Allsopp and his team, including attacks on a UK power plant and a supercomputing facility conducting spatial modelling of nuclear explosions for the military. He also describes the antics of a pentester who bypassed the security of a large corporate by observing the uniform of the firm's security guard, then showing up the next day in identical costume, pulling rank and relieving the man of duty

The enjoyment Allsopp clearly derives from his work is reflected in his book; he writes with that particular tone of repressed glee common among white hat hackers.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Loose Deuce on September 17, 2010
Format: Paperback Verified Purchase
A good, solid intro to penetration testing. Obviously each aspect of penetration testing deserves its own separate book, but I won't penalize the book for that. I enjoyed it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Westin on July 22, 2010
Format: Paperback
As the author notes several times throughout the book, this work is not exhaustive on any one subject. It does, however, provide a very nice overview of penetration testing as a whole. It covers several aspects that I wouldn't have thought of.

As a systems administrator, I bought this book to get some ideas about weak points in our network/physical security. After reading through some of the examples and case studies, I have made some changes that I think will go a long way in beefing up our security.

I would definitely recommend reading this book if you have any interest in IT/Physical security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Jordan on November 29, 2012
Format: Paperback Verified Purchase
It's hard to find information like this anywhere else. The book is very organized, and is a good place to turn for security administrators and penetration testers alike.

A little of the information seems outdated however. I've been looking for the Icom IC-R3 described in the book, as it would provide very useful to my job. The only place I've seen it is Ebay, and I'd rather not buy things from Ebay. If anybody knows where to get one, please leave a comment. Thanks!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Search
ARRAY(0xa557fc18)

What Other Items Do Customers Buy After Viewing This Item?