Hacking: The Next Generation: The Next Generation 1st Edition by Nitesh Dhanjani, Billy Rios, Brett Hardin – Ebook PDF Instant Download/Delivery. 0596154577, 978-0596154578
Full download Hacking: The Next Generation: The Next Generation 1st Edition after payment
Product details:
ISBN 10: 0596154577
ISBN 13: 978-0596154578
Author: Nitesh Dhanjani, Billy Rios, Brett Hardin
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
You’ll not only find valuable information on new hacks that attempt to exploit technical flaws, you’ll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
- Learn how “inside out” techniques can poke holes into protected networks
- Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
- Recognize weaknesses in today’s powerful cloud infrastructures and how they can be exploited
- Prevent attacks against the mobile workforce and their devices containing valuable data
- Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
- Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
Hacking: The Next Generation: The Next Generation 1st Table of contents:
Chapter 1: Intelligence Gathering: Peering Through the Windows to Your Organization
- 1.1 Physical Security Engineering
- 1.2 Google Earth
- 1.3 Social Engineering Call Centers
- 1.4 Search Engine Hacking
- 1.5 Leveraging Social Networks
- 1.6 Tracking Employees
- 1.7 What Information Is Important?
- 1.8 Summary
Chapter 2: Inside-Out Attacks: The Attacker Is the Insider
- 2.1 Man on the Inside
- 2.2 Cross-Site Scripting (XSS)
- 2.3 Cross-Site Request Forgery (CSRF)
- 2.4 Content Ownership
- 2.5 Advanced Content Ownership Using GIFARs
- 2.6 Stealing Files from the Filesystem
- 2.7 Summary
Chapter 3: The Way It Works: There Is No Patch
- 3.1 Exploiting Telnet and FTP
- 3.2 Abusing SMTP
- 3.3 Abusing ARP
- 3.4 Summary
Chapter 4: Blended Threats: When Applications Exploit Each Other
- 4.1 Application Protocol Handlers
- 4.2 Blended Attacks
- 4.3 Finding Blended Threats
- 4.4 Summary
Chapter 5: Cloud Insecurity: Sharing the Cloud with Your Enemy
- 5.1 What Changes in the Cloud
- 5.2 Attacks Against the Cloud
- 5.3 Summary
Chapter 6: Abusing Mobile Devices: Targeting Your Mobile Workforce
- 6.1 Targeting Your Mobile Workforce
- 6.2 Summary
Chapter 7: Infiltrating the Phishing Underground: Learning from Online Criminals?
- 7.1 The Fresh Phish Is in the Tank
- 7.2 Examining the Phishers
- 7.3 The Loot
- 7.4 Infiltrating the Underground
- 7.5 Summary
Chapter 8: Influencing Your Victims: Do What We Tell You, Please
- 8.1 The Calendar Is a Gold Mine
- 8.2 Social Identities
- 8.3 Hacking the Psyche
- 8.4 Summary
Chapter 9: Hacking Executives: Can Your CEO Spot a Targeted Attack?
- 9.1 Fully Targeted Attacks Versus Opportunistic Attacks
- 9.2 Motives
- 9.3 Information Gathering
- 9.4 Attack Scenarios
- 9.5 Summary
Chapter 10: Case Studies: Different Perspectives
- 10.1 The Disgruntled Employee
- 10.2 The Silver Bullet
- 10.3 Summary
People also search for Hacking: The Next Generation: The Next Generation 1st:
next-generation bomber
what is the next generation fighter jet
hacking generation zero
lockheed martin next generation interceptor
what is the next generation interceptor