Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
, ,

Hacking The Next Generation

Bringing the Attack to your Network

Paperback Engels 2009 1e druk 9780596154578
Verwachte levertijd ongeveer 16 werkdagen

Samenvatting

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

- Learn how "inside out" techniques can poke holes into protected networks
- Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
- Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
- Prevent attacks against the mobile workforce and their devices containing valuable data
- Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
- Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Specificaties

ISBN13:9780596154578
Taal:Engels
Bindwijze:paperback
Aantal pagina's:279
Uitgever:O'Reilly
Druk:1
Hoofdrubriek:IT-management / ICT

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Over Nitesh Dhanjani

Nitesh Dhanjani is a well known information security researcher and speaker. Dhanjani is the author of "Hacking: The Next Generation" (O'Reilly), "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O'Reilly), and "HackNotes:Linux and Unix Security" (Osborne McGraw-Hill). He is also a contributing author to "Hacking Exposed 4" (Osborne McGraw-Hill) and "HackNotes:Network Security" (Osborne McGraw-Hill). At Ernst & Young, Dhanjani is Senior Manager in the Advisory practice, responsible for helping some of the largest corporations establish enterprise wide information security programs and solutions. Dhanjani is also responsible for evangelizing brand new technology service lines around emerging technologies and trends such as social media, cloud computing, and virtualization. Prior to E&Y, Dhanjani was Senior Director of Application Security and Assessments at Equifax where he spearheaded security efforts into enhancing the enterprise SDLC, created a process for performing source code security reviews & threat modeling, and managed the attack & penetration team. Before Equifax, Dhanjani was Senior Advisor at Foundstone's Professional Services group where, in addition to performing security assessments, he contributed to and taught Foundstone's Ultimate Hacking security courses. Dhanjani holds both a Bachelor's and Master's degree in Computer Science from Purdue University. Dhanjani's personal blog is located at dhanjani.com.

Andere boeken door Nitesh Dhanjani

Over Billy Rios

Billy Rios is a security engineer for a well known software company based out of Redmond. Billy is helping to secure software used by millions of people across the world. Prior to his current role, Billy was a penetration tester for both VeriSign and Ernst and Young. As a penetration tester, Billy was hired by numerous organizations within the Fortune 500 to assess the effectiveness of their organization's security posture. Billy made his living by outsmarting security teams, bypassing security measures, and demonstrating the business risk of security exposures to executives and organizational decision makers. Before his life as a penetration tester, Billy worked as an Information Assurance Analyst for the Defense Information Systems Agency (DISA). While at DISA, Billy helped protect Department of Defense (DoD) information systems by performing network intrusion detection, vulnerability analysis, incident handling, and formal incident reporting on security related events involving DoD information systems. Before attacking and defending information systems, Billy was an active duty Officer in the United States Marine Corps. Billy has spoken at numerous security conferences including: Blackhat briefings, Bluehat, RSA and Hack in the Box. Billy holds a Bachelors degree in Business Administration, Master of Science degree in Information Systems, and is currently pursuing his Master of Business Administration.

Andere boeken door Billy Rios

Over Brett Hardin

Brett Hardin is a Security Research Lead with McAfee. At McAfee, Brett bridges security and business perspectives to aid upper management in understanding security issues. Before joining McAfee, Brett was a penetration tester for Ernst and Young's Advanced Security Center assessing web application and intranet security for Fortune 500 companies. In addition, Brett also is the author of misc-security.com. A blog dedicated to focusing on security topics from a high-level or business-level perspective.

Andere boeken door Brett Hardin

Inhoudsopgave

Preface

1. Intelligence gathering: Peering through the Windows to your organization
2. Inside-out attacks: The attacker is the insider
3. The way it works: There is no patch
4. Blended threats: When application exploit each other
5. Cloud insecurtiy: sharing the cloud with your enemy
6. Abusing Mobile Devices: Targeting your mobile workforce
7. Infiltrating the phishing underground: Learning from online criminals
8. Influencing your victims: Do what we tell you, please
9. Hacking executives: Can your CEO Spot a Targeted Attack?
10. Case studies: Different perspectives

A: Chapter 2: Source code samples
B: Cache_Snoop.pl

Index

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Hacking The Next Generation