Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

· Elsevier
3,0
8 მიმოხილვა
ელწიგნი
336
გვერდი
მისაღები
რეიტინგები და მიმოხილვები დაუდასტურებელია  შეიტყვეთ მეტი

ამ ელწიგნის შესახებ

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. - Discusses techniques used by malicious attackers in real-world situations - Details unorthodox penetration testing techniques by getting inside the mind of a ninja - Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

შეფასებები და მიმოხილვები

3,0
8 მიმოხილვა

ავტორის შესახებ

Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI. Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master's degrees in both Computer Science and Management. His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

შეაფასეთ ეს ელწიგნი

გვითხარით თქვენი აზრი.

ინფორმაცია წაკითხვასთან დაკავშირებით

სმარტფონები და ტაბლეტები
დააინსტალირეთ Google Play Books აპი Android და iPad/iPhone მოწყობილობებისთვის. ის ავტომატურად განახორციელებს სინქრონიზაციას თქვენს ანგარიშთან და საშუალებას მოგცემთ, წაიკითხოთ სასურველი კონტენტი ნებისმიერ ადგილას, როგორც ონლაინ, ისე ხაზგარეშე რეჟიმში.
ლეპტოპები და კომპიუტერები
Google Play-ში შეძენილი აუდიოწიგნების მოსმენა თქვენი კომპიუტერის ვებ-ბრაუზერის გამოყენებით შეგიძლიათ.
ელწამკითხველები და სხვა მოწყობილობები
ელექტრონული მელნის მოწყობილობებზე წასაკითხად, როგორიცაა Kobo eReaders, თქვენ უნდა ჩამოტვირთოთ ფაილი და გადაიტანოთ იგი თქვენს მოწყობილობაში. დახმარების ცენტრის დეტალური ინსტრუქციების მიხედვით გადაიტანეთ ფაილები მხარდაჭერილ ელწამკითხველებზე.