Low Tech Hacking: Street Smarts for Security Professionals (häftad)
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
264
Utgivningsdatum
2012-01-27
Förlag
SYNGRESS MEDIA
Medarbetare
Gudaitis, Terry / Jabbusch, Jennifer / Rogers, Russ / Lowther, Sean
Illustratör/Fotograf
Illustrated
Illustrationer
Illustrated
Dimensioner
231 x 188 x 18 mm
Vikt
545 g
Antal komponenter
1
ISBN
9781597496650
Low Tech Hacking: Street Smarts for Security Professionals (häftad)

Low Tech Hacking: Street Smarts for Security Professionals

Häftad,  Engelska, 2012-01-27
412
  • Skickas från oss inom 10-15 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.
  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture
Visa hela texten

Passar bra ihop

  1. Low Tech Hacking: Street Smarts for Security Professionals
  2. +
  3. Feel-Good Productivity

De som köpt den här boken har ofta också köpt Feel-Good Productivity av Ali Abdaal (häftad).

Köp båda 2 för 600 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Recensioner i media

"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."--Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.



Övrig information

Jack Wiles is a security professional with over 40 years' experience in security-related fields. This includes computer security, disaster recovery, and physical security. He is a professional speaker, and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects, which are now being labeled "Homeland Security" topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, IRS-CID, U.S. Customs, Department of Justice, The Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68, where he was awarded two Bronze stars for his actions in combat. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career. Terry Gudaitis, Ph.D., is the CyberIntelligence Director at Cyveillance. Terry gained a foundation for her expertise as an operations officer and behavioral profiler at the CIA's Counter Terrorist Center. At CIA, she was responsible for developing terrorist profiles, assessments of informants, and managing targeting teams. In addition to her corporate-related work, Terry has served on the United States Secret Service Advisory Board for Insider Threat, regularly presents at national and international conferences, and has authored publications in numerous security-related journals and books. Jennifer Jabbusch, CISSP, CISO, HP MASE, JNCIA-AC, is a network security engineer and consultant with Carolina Advanced Digital, Inc. Jennifer has more than 15 years' experience working in various areas of the technology industry. Most recently, she has focused in specialized areas of infrastructure security, including Network Access Control, 802.1X and Wireless Security technologies. Ms. Jabbusch has consulted for a variety of government agencies, educational institutions, and Fortune 100 and 500 corporations and has spoken at a variety of conferences including DeepSec, SecTor, TechnoSecurity, RSA, InfoSec World, CSI, and many others. In addition to her regular duties, she participates in a variety of courseware and exam writings and reviews, including acting as subject matter expert in the Cryptography domain of the official (ISC)2 CISSP courseware (v9). You can find more security topics and musings on her security blog at http://SecurityUncorked.com. Russ Rogers (CISSP, CISM...

Innehållsförteckning

Foreword by Paul A. Henry Introduction Chapter 1. Social Engineering-The Ultimate Low Tech Hacking Threat Chapter 2. Low Tech Vulerabilities-Physical Security Chapter 3. More About Locks and Ways to Low Tech Hack Them Chapter 4. Low Tech Wireless Hacking Chapter 5. Low Tech Targeting and Surveillance-How Much Could They Find Out About You? Chapter 6. Low Tech Hacking for the Penetration Tester Chapter 7. Low Tech Hacking and the Law-Where Can You Go For Help? Chapter 8. Information Security Awareness Training: Your Most Valuable Countermeasure to Employee Risk