Wrightson | Advanced Persistent Threat Hacking | Buch | 978-0-07-182836-9 | www.sack.de

Buch, Englisch, 464 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 863 g

Wrightson

Advanced Persistent Threat Hacking

The Art and Science of Hacking Any Organization
Erscheinungsjahr 2014
ISBN: 978-0-07-182836-9
Verlag: McGraw-Hill Education

The Art and Science of Hacking Any Organization

Buch, Englisch, 464 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 863 g

ISBN: 978-0-07-182836-9
Verlag: McGraw-Hill Education


Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. - Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike
- Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
- Perform in-depth reconnaissance to build a comprehensive understanding of the target
- Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
- Use social engineering to compromise a specific system, application, or workstation
- Identify and attack wireless networks and wireless client devices
- Spearphish with hardware-based Trojan devices
- Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Wrightson Advanced Persistent Threat Hacking jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance – Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors


Wrightson, Tyler
Tyler Wrightson is the author of Advanced Persistent Threats and Wireless Network Security: A Beginner's Guide. Tyler is the founder and president of Leet Systems, which provides offensive security services such as Penetration Testing and Red Teaming to secure organizations against real world attackers. Tyler has over twelve years experience in the IT security field with extensive experience in all forms of offensive security and penetration testing. Tyler holds industry certifications for CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, wireless security, and network security. He has been a frequent speaker at industry conferences including Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com.

Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, whichprovides offensive security services such as penetration testing and red teaming. He is the author of WirelessNetwork Security: A Beginner’s Guide. Follow Tyler's security blog at http://blog.leetsys.com.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.