Articoli correlati a Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking: Street Smarts for Security Professionals - Brossura

 
9781597496650: Low Tech Hacking: Street Smarts for Security Professionals

Sinossi

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sugli autori

Dr. Terry Gudaitis is the Owner/Principal of Mindstar Security & Profiling, LLC which specializes in custom cyber and physical security solutions for Family Offices, high net worth persons, and their families. Terry started her career as a CIA operations officer and behavioral profiler. She left government service to pursue the expansion of profiling techniques as they applied to hackers targeting the financial services and energy sectors. She altered classic behavioral/psychological profiling methods used in homicide, serial crime, and terrorist investigation and adapted them for the applied use in computer crime investigations which included the integration of cyber intelligence as part of the investigations process. Prior to forming her own firm, Terry was the Vice President and Cyber Intelligence Director at Cyveillance and held senior positions at other private sector firms. In addition to her corporate related work, Terry is on the Advisory Boards of Mi3 Security Inc. and TechnoSecurity; has served on the United States Secret Service Advisory Board for Insider Threat; trained investigators at the National Center for Missing and Exploited Children; and, regularly presents at national and international conferences. Terry is also a featured speaker at the International Spy Museum in Washington, DC. She received a Ph.D. in behavioral science from the University of Florida.

Jennifer Jabbusch, CISSP, CISO, HP MASE, JNCIA-AC, is a network security engineer and consultant with Carolina Advanced Digital, Inc. Jennifer has more than 15 years' experience working in various areas of the technology industry. Most recently, she has focused in specialized areas of infrastructure security, including Network Access Control, 802.1X and Wireless Security technologies. Ms. Jabbusch has consulted for a variety of government agencies, educational institutions, and Fortune 100 and 500 corporations and has spoken at a variety of conferences including DeepSec, SecTor, TechnoSecurity, RSA®, InfoSec World, CSI, and many others. In addition to her regular duties, she participates in a variety of courseware and exam writings and reviews, including acting as subject matter expert in the Cryptography domain of the official (ISC)2® CISSP® courseware (v9). You can find more security topics and musings on her security blog at http://SecurityUncorked.com.

Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).

Jack Wiles is a security professional with over 40 years' experience in security-related fields. This includes computer security, disaster recovery, and physical security. He is a professional speaker, and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects, which are now being labeled "Homeland Security" topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, IRS-CID, U.S. Customs, Department of Justice, The Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68, where he was awarded two Bronze stars for his actions in combat. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career.

Sean Lowther is the President and Founder of Stealth Awareness, Inc. (www.stealthawareness.com). Sean is an independent consultant who brings years of experience designing and implementing information security awareness programs at the highest level. He founded Stealth Awareness, Inc. in 2007. Sean worked at Bank of America for over seven years, managing the enterprise information security awareness program. The program received the highest rating from its regulators and was consistently rated "world class" by industry peer groups. Sean has worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the enactment of the Gramm-Leach-Bliley Act. He produced the video "It's Not If, But When" for the Financial Services Sector Coordinating Council in partnership with the U.S. Treasury Department with the goal to improve critical infrastructure protection and Homeland Security.

Dalla quarta di copertina

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: buono
Pages can have notes/highlighting...
Visualizza questo articolo

EUR 8,32 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

EUR 11,47 per la spedizione da Regno Unito a Italia

Destinazione, tempi e costi

Risultati della ricerca per Low Tech Hacking: Street Smarts for Security Professionals

Foto dell'editore

Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ
Editore: Syngress Publishing, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Antico o usato Paperback

Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.3. Codice articolo G1597496650I3N00

Contatta il venditore

Compra usato

EUR 10,49
Convertire valuta
Spese di spedizione: EUR 8,32
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Lowther, Sean, Gudaitis, Terry, Jabbusch, Jennifer, Rogers, Russ, Wiles, Jack
ISBN 10: 1597496650 ISBN 13: 9781597496650
Antico o usato Brossura Prima edizione

Da: Better World Books, Mishawaka, IN, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 13625745-6

Contatta il venditore

Compra usato

EUR 16,10
Convertire valuta
Spese di spedizione: EUR 17,46
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Wiles, Jack/ Gudaitis, Terry/ Jabbusch, Jennifer
Editore: Syngress Media Inc, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Paperback

Da: Revaluation Books, Exeter, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Brand New. 1st edition. 264 pages. 9.30x7.50x0.90 inches. In Stock. Codice articolo __1597496650

Contatta il venditore

Compra nuovo

EUR 38,36
Convertire valuta
Spese di spedizione: EUR 11,47
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Jack Wiles
Editore: Syngress Media,U.S., 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Paperback / softback

Da: THE SAINT BOOKSTORE, Southport, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 342. Codice articolo B9781597496650

Contatta il venditore

Compra nuovo

EUR 43,98
Convertire valuta
Spese di spedizione: EUR 8,29
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Wiles, Jack|Gudaitis, Terry|Jabbusch, Jennifer|Rogers, Russ|Lowther, Sean
Editore: Syngress Media|Syngress, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Brossura
Print on Demand

Da: moluna, Greven, Germania

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. This title contains descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may . Codice articolo 4228967

Contatta il venditore

Compra nuovo

EUR 49,09
Convertire valuta
Spese di spedizione: EUR 9,70
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Terry Gudaitis
Editore: Elsevier Science Dez 2011, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Taschenbuch
Print on Demand

Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement. Contains insider knowledge of what could be your most likely Low Tech threat Includes timely advice from some of the top security minds in the world Covers many detailed countermeasures that you can employ to improve your security posture 264 pp. Englisch. Codice articolo 9781597496650

Contatta il venditore

Compra nuovo

EUR 48,70
Convertire valuta
Spese di spedizione: EUR 11,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Lowther Sean Rogers Russ Jabbusch Jennifer Gudaitis Terry Wiles Jack
Editore: Elsevier, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Brossura

Da: Majestic Books, Hounslow, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. pp. xix + 243 Illus. Codice articolo 3395318

Contatta il venditore

Compra nuovo

EUR 49,67
Convertire valuta
Spese di spedizione: EUR 10,15
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 3 disponibili

Aggiungi al carrello

Foto dell'editore

Jack Wiles,Terry Gudaitis,Jennifer Jabbusch,Russ Rogers,Sean Lowther
Editore: Syngress 2011-12-19, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Paperback

Da: Chiron Media, Wallingford, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Codice articolo 6666-ELS-9781597496650

Contatta il venditore

Compra nuovo

EUR 41,03
Convertire valuta
Spese di spedizione: EUR 22,93
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Wiles, Jack
Editore: Syngress, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Brossura
Print on Demand

Da: Brook Bookstore On Demand, Napoli, NA, Italia

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: new. Questo è un articolo print on demand. Codice articolo 789b8cf515f1abce2c5162d5525dd7b6

Contatta il venditore

Compra nuovo

EUR 41,18
Convertire valuta
Spese di spedizione: EUR 23,10
In Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Sean Lowther Russ Rogers Jennifer Jabbusch Terry Gudaitis Jack Wiles
Editore: Elsevier, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuovo Brossura

Da: Books Puddle, New York, NY, U.S.A.

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. pp. xix + 243. Codice articolo 264485417

Contatta il venditore

Compra nuovo

EUR 58,95
Convertire valuta
Spese di spedizione: EUR 7,67
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 3 disponibili

Aggiungi al carrello

Vedi altre 5 copie di questo libro

Vedi tutti i risultati per questo libro