Description |
1 online resource (xix, 243 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Bibliography |
Includes bibliographical references and index. |
Contents |
Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk. |
Summary |
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions. |
Subject |
Computer security.
|
|
Hackers.
|
|
Computer Security |
|
Sécurité informatique.
|
|
Pirates informatiques.
|
|
Computers and IT.
|
|
Hackers
|
|
Computer security
|
Added Author |
Wiles, Jack.
|
|
Gudaitis, Terry.
|
|
Jabbusch, Jennifer.
|
|
Rogers, Russ.
|
|
Lowther, Sean.
|
Other Form: |
Print version: Low tech hacking. Waltham, Mass. : Syngress, ©2012 (DLC) 2011284980 |
ISBN |
9781597496650 |
|
1597496650 |
|
9781597496667 |
|
1597496669 |
Standard No. |
AU@ 000050012864 |
|
AU@ 000053281044 |
|
CHBIS 007226556 |
|
CHVBK 197894356 |
|
DEBBG BV040902088 |
|
DEBBG BV042314295 |
|
DEBSZ 360078931 |
|
DEBSZ 378295446 |
|
DEBSZ 381381536 |
|
GBVCP 785363602 |
|
NZ1 14775606 |
|
CHNEW 001010353 |
|