Low Tech Hacking

Street Smarts for Security Professionals

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, General Computing
Cover of the book Low Tech Hacking by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther ISBN: 9781597496667
Publisher: Elsevier Science Publication: December 13, 2011
Imprint: Syngress Language: English
Author: Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
ISBN: 9781597496667
Publisher: Elsevier Science
Publication: December 13, 2011
Imprint: Syngress
Language: English

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

More books from Elsevier Science

Cover of the book Handbook of Differential Equations: Evolutionary Equations by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Advanced Engineering Dynamics by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Advances in Heterocyclic Chemistry by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Handbook of Technical Textiles by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Advances in Imaging and Electron Physics by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Nonequilibrium Thermodynamics by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Handbook of Arsenic Toxicology by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Tribology in Machine Design by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Heat Transfer and Fluid Flow in Biological Processes by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Handbook of Borehole Acoustics and Rock Physics for Reservoir Characterization by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Postharvest Handling by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Rockslides and Rock Avalanches of Central Asia by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Control in Power Electronics by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Windows Forensic Analysis Toolkit by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
Cover of the book Video Coding for Mobile Communications by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy