Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 22 of 26
Previous Record Next Record
E-Book/E-Doc
Author Wilhelm, Thomas.

Title Ninja hacking : unconventional penetration testing tactics and techniques / Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant.

Imprint Amsterdam ; Boston : Syngress/Elsevier, ©2011.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxii, 310 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.
Contents Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement.
Bibliography Includes bibliographical references and index.
Note Print version record.
Subject Business enterprises -- Computer networks -- Security measures.
Business enterprises -- Computer networks -- Security measures
Added Author Andress, Jason.
Other Form: Print version: Wilhelm, Thomas. Ninja hacking. Amsterdam ; Boston : Syngress/Elsevier, ©2011 9781597495882 (OCoLC)610834117
ISBN 9781597495882 (electronic bk.)
1597495883 (electronic bk.)
Standard No. AU@ 000046315181
CHNEW 001009904
DEBBG BV039827095
DEBBG BV042300711
DEBSZ 399118950
NZ1 13642880

 
    
Available items only