Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$42.99$42.99
FREE delivery:
Thursday, Sep 14
Payment
Secure transaction
Ships from
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Buy used: $34.27
Other Sellers on Amazon
+ $3.99 shipping
83% positive over last 12 months
Usually ships within 4 to 5 days.
+ $3.99 shipping
88% positive over last 12 months
Usually ships within 2 to 3 days.
& FREE Shipping
90% positive over last 12 months
Usually ships within 4 to 5 days.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Unauthorised Access: Physical Penetration Testing For IT Security Teams 1st Edition
| Price | New from | Used from |
|
Digital
"Please retry" |
—
| — | — |
- Kindle
$30.00 Read with Our Free App - Paperback
$34.27 - $42.9915 Used from $16.47 17 New from $32.74 - Digital
—
Purchase options and add-ons
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.
- Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance
- Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels
- Includes safeguards for consultants paid to probe facilities unbeknown to staff
- Covers preparing the report and presenting it to management
In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
- ISBN-100470747617
- ISBN-13978-0470747612
- Edition1st
- PublisherWiley
- Publication dateSeptember 21, 2009
- LanguageEnglish
- Dimensions7.42 x 0.74 x 9.3 inches
- Print length320 pages
Frequently bought together

Similar items that may deliver to you quickly
Editorial Reviews
From the Inside Flap
Most IT security teams concentrate on keeping networks and systems safe from the outside – usually with the entire focus on firewalls, server configuration, application security, intrusion detection systems, and the like. But what if your attacker was on the inside? What if they were sitting at an employee’s computer, or placing a wireless access point hidden in a wiring closet or even roaming inside your server room?
Unauthorised Access provides the first guide to planning and performing physical penetration tests. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight) and getting access to networks and data. Learn to think like an attacker with topics that include:
- Types of target vs level of anticipated response
- Dealing with guards
- Intelligence tradecraft, satellite imagery and in depth information gathering
- Planting bugs and covert wireless access points
- Hacking security cameras
- Strategic, tactical and operational planning
- Defeating locks, electronic keypads and other electronic access systems
- Social engineering - the weakest link
- Using your “Get Out of Jail Free” card
- Complying with local laws
- Attacking wireless networks
From the Back Cover
Most IT security teams concentrate on keeping networks and systems safe from the outside – usually with the entire focus on firewalls, server configuration, application security, intrusion detection systems, and the like. But what if your attacker was on the inside? What if they were sitting at an employee’s computer, or placing a wireless access point hidden in a wiring closet or even roaming inside your server room?
Unauthorised Access provides the first guide to planning and performing physical penetration tests. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight) and getting access to networks and data. Learn to think like an attacker with topics that include:
- Types of target vs level of anticipated response
- Dealing with guards
- Intelligence tradecraft, satellite imagery and in depth information gathering
- Planting bugs and covert wireless access points
- Hacking security cameras
- Strategic, tactical and operational planning
- Defeating locks, electronic keypads and other electronic access systems
- Social engineering - the weakest link
- Using your “Get Out of Jail Free” card
- Complying with local laws
- Attacking wireless networks
About the Author
Wil Allsopp (Netherlands) is an IT security expert who has provided security audits for some of the largest companies in the UK including top tier banking, government and most of the Fortune 100. His job requires him to be part hacker, and part thief as companies hire him to probe their security measures to the extreme.
Product details
- Publisher : Wiley; 1st edition (September 21, 2009)
- Language : English
- Paperback : 320 pages
- ISBN-10 : 0470747617
- ISBN-13 : 978-0470747612
- Item Weight : 1.26 pounds
- Dimensions : 7.42 x 0.74 x 9.3 inches
- Best Sellers Rank: #1,304,835 in Books (See Top 100 in Books)
- #884 in Computer Hacking
- #995 in Computer Network Security
- #5,624 in Computer Science (Books)
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
A little of the information seems outdated however. I've been looking for the Icom IC-R3 described in the book, as it would provide very useful to my job. The only place I've seen it is Ebay, and I'd rather not buy things from Ebay. If anybody knows where to get one, please leave a comment. Thanks!
As a systems administrator, I bought this book to get some ideas about weak points in our network/physical security. After reading through some of the examples and case studies, I have made some changes that I think will go a long way in beefing up our security.
I would definitely recommend reading this book if you have any interest in IT/Physical security.









