No Tech Hacking 2024 pdf epub mobi 电子书


No Tech Hacking

简体网页||繁体网页

No Tech Hacking 2024 pdf epub mobi 电子书 著者简介


No Tech Hacking 电子书 图书目录




点击这里下载
    


想要找书就要到 本本书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

发表于2024-07-05

No Tech Hacking 2024 pdf epub mobi 电子书

No Tech Hacking 2024 pdf epub mobi 电子书

No Tech Hacking 2024 pdf epub mobi 电子书



喜欢 No Tech Hacking 电子书 的读者还喜欢


No Tech Hacking 电子书 读后感

评分

评分

评分

评分

评分

类似图书 点击查看全场最低价
出版者:Syngress
作者:Johnny Long
出品人:
页数:480
译者:
出版时间:2008-02-21
价格:USD 49.95
装帧:Paperback
isbn号码:9781597492157
丛书系列:

图书标签: 黑客  ⎋黑客技术   


No Tech Hacking 2024 pdf epub mobi 电子书 图书描述

在线阅读本书

As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.

As you browse this book, you'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?

. Dumpster Diving

Be a good sport and don't read the two "D" words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).

. Tailgating

Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.

. Shoulder Surfing

If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.

. Physical Security

Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?

. Social Engineering with Jack Wiles

Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.

. Google Hacking

A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.

. P2P Hacking

Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.

. People Watching

Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.

. Kiosks

What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?

. Vehicle Surveillance

Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

No Tech Hacking 2024 pdf epub mobi 电子书

No Tech Hacking 2024 pdf epub mobi 电子书
想要找书就要到 本本书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

No Tech Hacking 2024 pdf epub mobi 用户评价

评分

评分

评分

评分

评分

No Tech Hacking 2024 pdf epub mobi 电子书


分享链接









相关图书




本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

友情链接

© 2024 onlinetoolsland.com All Rights Reserved. 本本书屋 版权所有