Artículos relacionados a Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking: Street Smarts for Security Professionals - Tapa blanda

 
9781597496650: Low Tech Hacking: Street Smarts for Security Professionals

Sinopsis

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca de los autores

Dr. Terry Gudaitis is the Owner/Principal of Mindstar Security & Profiling, LLC which specializes in custom cyber and physical security solutions for Family Offices, high net worth persons, and their families. Terry started her career as a CIA operations officer and behavioral profiler. She left government service to pursue the expansion of profiling techniques as they applied to hackers targeting the financial services and energy sectors. She altered classic behavioral/psychological profiling methods used in homicide, serial crime, and terrorist investigation and adapted them for the applied use in computer crime investigations which included the integration of cyber intelligence as part of the investigations process. Prior to forming her own firm, Terry was the Vice President and Cyber Intelligence Director at Cyveillance and held senior positions at other private sector firms. In addition to her corporate related work, Terry is on the Advisory Boards of Mi3 Security Inc. and TechnoSecurity; has served on the United States Secret Service Advisory Board for Insider Threat; trained investigators at the National Center for Missing and Exploited Children; and, regularly presents at national and international conferences. Terry is also a featured speaker at the International Spy Museum in Washington, DC. She received a Ph.D. in behavioral science from the University of Florida.

Jennifer Jabbusch, CISSP, CISO, HP MASE, JNCIA-AC, is a network security engineer and consultant with Carolina Advanced Digital, Inc. Jennifer has more than 15 years' experience working in various areas of the technology industry. Most recently, she has focused in specialized areas of infrastructure security, including Network Access Control, 802.1X and Wireless Security technologies. Ms. Jabbusch has consulted for a variety of government agencies, educational institutions, and Fortune 100 and 500 corporations and has spoken at a variety of conferences including DeepSec, SecTor, TechnoSecurity, RSA®, InfoSec World, CSI, and many others. In addition to her regular duties, she participates in a variety of courseware and exam writings and reviews, including acting as subject matter expert in the Cryptography domain of the official (ISC)2® CISSP® courseware (v9). You can find more security topics and musings on her security blog at http://SecurityUncorked.com.

Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).

Jack Wiles is a security professional with over 40 years' experience in security-related fields. This includes computer security, disaster recovery, and physical security. He is a professional speaker, and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects, which are now being labeled "Homeland Security" topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, IRS-CID, U.S. Customs, Department of Justice, The Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68, where he was awarded two Bronze stars for his actions in combat. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career.

Sean Lowther is the President and Founder of Stealth Awareness, Inc. (www.stealthawareness.com). Sean is an independent consultant who brings years of experience designing and implementing information security awareness programs at the highest level. He founded Stealth Awareness, Inc. in 2007. Sean worked at Bank of America for over seven years, managing the enterprise information security awareness program. The program received the highest rating from its regulators and was consistently rated "world class" by industry peer groups. Sean has worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the enactment of the Gramm-Leach-Bliley Act. He produced the video "It's Not If, But When" for the Financial Services Sector Coordinating Council in partnership with the U.S. Treasury Department with the goal to improve critical infrastructure protection and Homeland Security.

De la contraportada

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

"Sobre este título" puede pertenecer a otra edición de este libro.

Comprar usado

Condición: Aceptable
Pages can have notes/highlighting...
Ver este artículo

EUR 8,34 gastos de envío desde Estados Unidos de America a España

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 11,45 gastos de envío desde Reino Unido a España

Destinos, gastos y plazos de envío

Resultados de la búsqueda para Low Tech Hacking: Street Smarts for Security Professionals

Imagen de archivo

Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ
Publicado por Syngress Publishing, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Antiguo o usado Paperback

Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.3. Nº de ref. del artículo: G1597496650I3N00

Contactar al vendedor

Comprar usado

EUR 9,78
Convertir moneda
Gastos de envío: EUR 8,34
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Lowther, Sean, Gudaitis, Terry, Jabbusch, Jennifer, Rogers, Russ, Wiles, Jack
ISBN 10: 1597496650 ISBN 13: 9781597496650
Antiguo o usado Tapa blanda Original o primera edición

Librería: Better World Books, Mishawaka, IN, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Nº de ref. del artículo: 13625745-6

Contactar al vendedor

Comprar usado

EUR 11,07
Convertir moneda
Gastos de envío: EUR 17,51
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Wiles, Jack/ Gudaitis, Terry/ Jabbusch, Jennifer
Publicado por Syngress Media Inc, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Paperback

Librería: Revaluation Books, Exeter, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Brand New. 1st edition. 264 pages. 9.30x7.50x0.90 inches. In Stock. Nº de ref. del artículo: __1597496650

Contactar al vendedor

Comprar nuevo

EUR 38,28
Convertir moneda
Gastos de envío: EUR 11,45
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Jack Wiles
Publicado por Syngress Media,U.S., 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Paperback / softback

Librería: THE SAINT BOOKSTORE, Southport, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 342. Nº de ref. del artículo: B9781597496650

Contactar al vendedor

Comprar nuevo

EUR 43,89
Convertir moneda
Gastos de envío: EUR 6,34
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Jack Wiles,Terry Gudaitis,Jennifer Jabbusch,Russ Rogers,Sean Lowther
Publicado por Syngress 2011-12-19, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Paperback

Librería: Chiron Media, Wallingford, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: New. Nº de ref. del artículo: 6666-ELS-9781597496650

Contactar al vendedor

Comprar nuevo

EUR 40,95
Convertir moneda
Gastos de envío: EUR 17,16
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Terry Gudaitis
Publicado por Elsevier Science Dez 2011, 2011
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement. Contains insider knowledge of what could be your most likely Low Tech threat Includes timely advice from some of the top security minds in the world Covers many detailed countermeasures that you can employ to improve your security posture 264 pp. Englisch. Nº de ref. del artículo: 9781597496650

Contactar al vendedor

Comprar nuevo

EUR 48,70
Convertir moneda
Gastos de envío: EUR 11,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Lowther Sean Rogers Russ Jabbusch Jennifer Gudaitis Terry Wiles Jack
Publicado por Elsevier, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Tapa blanda

Librería: Majestic Books, Hounslow, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. pp. xix + 243 Illus. Nº de ref. del artículo: 3395318

Contactar al vendedor

Comprar nuevo

EUR 49,82
Convertir moneda
Gastos de envío: EUR 10,13
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Gudaitis, Terry
Publicado por Syngress, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Paperback

Librería: Toscana Books, AUSTIN, TX, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Nº de ref. del artículo: Scanned1597496650

Contactar al vendedor

Comprar nuevo

EUR 34,79
Convertir moneda
Gastos de envío: EUR 25,63
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen del vendedor

Terry Gudaitis
Publicado por Elsevier Science, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Nuevo Taschenbuch
Impresión bajo demanda

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement. Nº de ref. del artículo: 9781597496650

Contactar al vendedor

Comprar nuevo

EUR 54,46
Convertir moneda
Gastos de envío: EUR 11,99
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Wiles, Jack; Gudaitis, Terry; Jabbusch, Jennifer; Rogers, Russ; Lowther, Sean
Publicado por Syngress, 2012
ISBN 10: 1597496650 ISBN 13: 9781597496650
Antiguo o usado Paperback

Librería: BookResQ., West Valley City, UT, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: As New. New, Light dirt marks on page edges from storage. Priority shipping available on this item. **NO international shipping. -3aa-. Nº de ref. del artículo: C4607152016MAP154609

Contactar al vendedor

Comprar usado

EUR 15,82
Convertir moneda
Gastos de envío: EUR 51,24
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Existen otras 5 copia(s) de este libro

Ver todos los resultados de su búsqueda