Description
Low Tech Hacking
Street Smarts for Security Professionals
Authors: Gudaitis Terry, Jabbusch Jennifer, Rogers Russ, Wiles Jack, Lowther Sean
Language: EnglishSubjects for Low Tech Hacking:
Keywords
4-1-9 advance fee fraud; 802.11; Access point; Biometrics; Black hat hacker; Blippy; Bluetooth; Butt-set kit; Caller ID spoofing; Classification of Data Matrix; Countermeasure; Denial of service; Electromagnetic radiation; Executive Protection Institute; Facebook; Farewell attack; FBI; Hasp; Identity theft; Information Security Awareness Program; Information Security Awareness Specialist; ISM band; Jammer; Key control; Key micrometer; KeyGhost; Keystroke logger; LinkedIn; Metasploit; Outsider-insider threat; Padlock shim; Peer-to-Peer network search; Penetration test; PeopleFind site; Physical security; Pin tumbler lock; Queensland attack; Quick Reference Guide; Radio frequency; Rim cylinder lock; Risk; Selective attention; Shoulder surfing; Skimming; Slide hammer; Social engineering; Social media site; Social networking site; Sound amplifier; Spear phishing; Surveillance; Tailgating; Threat; Touch point; Twitter; U.S; Secret Service; USB thumb drive; Vulnerability; Warded padlock; Wi-Fi scanner; Wireless communications system; Wireless Local Area Network; Wireless Personal Area Network; Wrapper; Yagi antenna
46.15 €
In Print (Delivery period: 14 days).
Add to cart the book of Gudaitis Terry, Jabbusch Jennifer, Rogers Russ, Wiles Jack, Lowther Sean264 p. · 19x23.4 cm · Paperback
Description
/li>Contents
/li>Readership
/li>Biography
/li>Comment
/li>
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.
Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.
This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
Foreword by Paul A. Henry Introduction Chapter 1. Social Engineering—The Ultimate Low Tech Hacking Threat Chapter 2. Low Tech Vulerabilities—Physical Security Chapter 3. More About Locks and Ways to Low Tech Hack Them Chapter 4. Low Tech Wireless Hacking Chapter 5. Low Tech Targeting and Surveillance—How Much Could They Find Out About You? Chapter 6. Low Tech Hacking for the Penetration Tester Chapter 7. Low Tech Hacking and the Law—Where Can You Go For Help? Chapter 8. Information Security Awareness Training: Your Most Valuable Countermeasure to Employee Risk
Penetration Testers, Internal Auditors, Information Systems Auditors, CIOs, CISOs, Risk Managers, Fraud Investigators, System Administrators, Private Investigators, Ethical Hackers, Black Hat Hackers, Members of Local, State, and Federal Law Enforcement, Corporate Attorneys
Jennifer Jabbusch, CISSP, CISO, HP MASE, JNCIA-AC, is a network security engineer and consultant with Carolina Advanced Digital, Inc. Jennifer has more than 15 years' experience working in various areas of the technology industry. Most recently, she has focused in specialized areas of infrastructure security, including Network Access Control, 802.1X and Wireless Security technologies. Ms. Jabbusch has consulted for a variety of government agencies, educational institutions, and Fortune 100 and 500 corporations and has spoken at a variety of conferences including DeepSec, SecTor, TechnoSecuri
- Contains insider knowledge of what could be your most likely Low Tech threat
- Includes timely advice from some of the top security minds in the world
- Covers many detailed countermeasures that you can employ to improve your security posture
These books may interest you
Hacking For Dummies 32.43 €