Hacking connected cars : (Record no. 12688)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05997cam a2200745 i 4500 |
001 - CONTROL NUMBER | |
control field | on1142524939 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200307s2020 inu o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | EBLCP |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | EBLCP |
Modifying agency | RECBK |
-- | UKMGB |
-- | OCLCO |
-- | N$T |
-- | UKAHL |
-- | OCLCQ |
-- | OCLCF |
-- | YDXIT |
-- | DG1 |
-- | OCLCQ |
-- | OCLCO |
-- | IEEEE |
-- | TEFOD |
-- | K6U |
-- | OCLCQ |
-- | UPM |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBC013531 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 019690857 |
Source | Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119491774 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119491770 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119491736 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119491738 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119491781 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119491789 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119491804 |
Qualifying information | (paperback) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119491774 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067253991 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 019690857 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1142524939 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9781119491736 |
Source of stock number/acquisition | Wiley |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9820810 |
Source of stock number/acquisition | IEEE |
037 ## - SOURCE OF ACQUISITION | |
Stock number | B847C5AB-35DB-47E6-A3FC-F92841002A03 |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TL152.8 |
Item number | .K65 2020 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 629.04/6 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Knight, Alissa, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Hacking connected cars : |
Remainder of title | tactics, techniques, and procedures / |
Statement of responsibility, etc. | Alissa Knight. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, Indiana : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Inc., |
Date of production, publication, distribution, manufacture, or copyright notice | [2020] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xxxiii, 238 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Foreword -- Introduction -- For Non-Automotive Experts -- Automotive Networking -- Target Audience -- How This Book Is Structured -- What's on the Website -- Summary -- Part I Tactics, Techniques, and Procedures -- Chapter 1 Pre-Engagement -- Penetration Testing Execution Standard -- Scope Definition -- Architecture -- Full Disclosure -- Release Cycles -- IP Addresses -- Source Code -- Wireless Networks -- Start and End Dates -- Hardware Unique Serial Numbers |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Rules of Engagement -- Timeline -- Testing Location -- Work Breakdown Structure -- Documentation Collection and Review -- Example Documents -- Project Management -- Conception and Initiation -- Definition and Planning -- Launch or Execution -- Performance/Monitoring -- Project Close -- Lab Setup -- Required Hardware and Software -- Laptop Setup -- Rogue BTS Option 1: OsmocomBB -- Rogue BTS Option 2: BladeRF + YateBTS -- Setting Up Your WiFi Pineapple Tetra -- Summary -- Chapter 2 Intelligence Gathering -- Asset Register -- Reconnaissance -- Passive Reconnaissance -- Active Reconnaissance |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities -- Stage 6: Enumerate the Exploits -- Stage 7: Perform Risk and Impact Analysis -- Summary -- Chapter 4 Vulnerability Analysis -- Passive and Active Analysis -- WiFi -- Bluetooth -- Summary -- Chapter 5 Exploitation -- Creating Your Rogue BTS -- Configuring NetworkinaPC |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Bringing Your Rogue BTS Online -- Hunting for the TCU -- When You Know the MSISDN of the TCU -- When You Know the IMSI of the TCU -- When You Don't Know the IMSI or MSISDN of the TCU -- Cryptanalysis -- Encryption Keys -- Impersonation Attacks -- Summary -- Chapter 6 Post Exploitation -- Persistent Access -- Creating a Reverse Shell -- Linux Systems -- Placing the Backdoor on the System -- Network Sniffing -- Infrastructure Analysis -- Examining the Network Interfaces -- Examining the ARP Cache -- Examining DNS -- Examining the Routing Table -- Identifying Services -- Fuzzing |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Filesystem Analysis -- Command-Line History -- Core Dump Files -- Debug Log Files -- Credentials and Certificates -- Over-the-Air Updates -- Summary -- Part II Risk Management -- Chapter 7 Risk Management -- Frameworks -- Establishing the Risk Management Program -- SAE J3061 -- ISO/SAE AWI 21434 -- HEAVENS -- Threat Modeling -- STRIDE -- PASTA -- TRIKE -- Summary -- Chapter 8 Risk-Assessment Frameworks -- HEAVENS -- Determining the Threat Level -- Determining the Impact Level -- Determining the Security Level -- EVITA -- Calculating Attack Potential -- Summary -- Chapter 9 PKI in Automotive |
500 ## - GENERAL NOTE | |
General note | VANET |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from digital title page (viewed on June 09, 2020). |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Automated vehicles. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Automated vehicles |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Penetration testing (Computer security) |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | V�ehicules autonomes. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | V�ehicules autonomes |
General subdivision | S�ecurit�e |
-- | Mesures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Tests d'intrusion. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography & Encryption. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Automated vehicles |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Penetration testing (Computer security) |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Hacking connected cars (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGp63Dv9h6qby7j8tFFvpd |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Knight, Alissa. |
Title | Hacking Connected Cars : Tactics, Techniques, and Procedures. |
Place, publisher, and date of publication | Newark : John Wiley & Sons, Incorporated, �2020 |
International Standard Book Number | 9781119491804 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119491774</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH33784299 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH33784300 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6119409 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 2378823 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00812470 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.