第 1/5 張圖片
LOW TECH HACKING: STREET SMARTS FOR SECURITY PROFESSIONALS By Jack Wiles & Terry
狀況:
運費:
所在地:Memphis, Tennessee, 美國
送達日期:
估計於 5月24日, 五至 5月28日, 二之間送達 運送地點 43230
退貨:
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:285809585241
物品細節
- 物品狀況
- Book Title
- Low Tech Hacking: Street Smarts for Security Professionals
- Item Height
- 9.25 inches
- ISBN-10
- 1597496650
- Item Weight
- 1.2 pounds
- ISBN
- 9781597496650
- Publication Year
- 2012
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Publication Name
- Low Tech Hacking : Street Smarts for Security Professionals
- Item Length
- 9.2in
- Publisher
- Elsevier Science & Technology Books
- Item Width
- 7.5in
- Number of Pages
- 264 Pages
關於產品
Product Information
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
Product Identifiers
Publisher
Elsevier Science & Technology Books
ISBN-10
1597496650
ISBN-13
9781597496650
eBay Product ID (ePID)
109011219
Product Key Features
Publication Name
Low Tech Hacking : Street Smarts for Security Professionals
Format
Trade Paperback
Language
English
Publication Year
2012
Type
Textbook
Number of Pages
264 Pages
Dimensions
Item Length
9.2in
Item Width
7.5in
Additional Product Features
Lc Classification Number
Qa76.9.A25
Reviews
"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc., "In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack.Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker.The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing."-- Security Management, February 2013 and other publications "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com "All in all, Low Tech Hacking is a great overview of unconventional offensive and defensive methods to secure an organization. It will not make testers experts on physical security or wireless attacks all of a sudden, but it is a lively and useful starting point for further reading and training and a handy reference during an audit, too."-- Computers and Security 31 {2012} 738, "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com, "In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack...Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker...The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing."-- Security Management, February 2013 and other publications "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com "All in all, Low Tech Hacking is a great overview of unconventional offensive and defensive methods to secure an organization. It will not make testers experts on physical security or wireless attacks all of a sudden, but it is a lively and useful starting point for further reading and training and a handy reference during an audit, too."-- Computers and Security 31 {2012} 738, "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.
Table of Content
Foreword by Paul A. Henry Introduction Chapter 1. Social Engineering--The Ultimate Low Tech Hacking Threat Chapter 2. Low Tech Vulerabilities--Physical Security Chapter 3. More About Locks and Ways to Low Tech Hack Them Chapter 4. Low Tech Wireless Hacking Chapter 5. Low Tech Targeting and Surveillance--How Much Could They Find Out About You? Chapter 6. Low Tech Hacking for the Penetration Tester Chapter 7. Low Tech Hacking and the Law--Where Can You Go For Help? Chapter 8. Information Security Awareness Training: Your Most Valuable Countermeasure to Employee Risk
Copyright Date
2012
Target Audience
Scholarly & Professional
Topic
Security / General, Information Management, Information Technology
Dewey Decimal
005.8
Dewey Edition
22
Illustrated
Yes
Genre
Computers, Business & Economics
賣家提供的物品說明
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:285809585241
運費與處理費
物品所在地:
Memphis, Tennessee, 美國
運送地點
不丹, 中國, 中國台灣, 中國澳門, 中國香港, 中非共和國, 丹麥, 乍德, 也門, 亞塞拜疆共和國, 亞美尼亞, 以色列, 伯利茲, 佛得角群島, 保加利亞, 克羅地亞共和國, 冰島, 列支敦士登, 利比利亞, 剛果共和國, 剛果民主共和國, 加拿大, 加納, 加蓬共和國, 匈牙利, 南非, 南韓, 博茨瓦納, 卡塔爾, 印尼, 印度, 危地馬拉, 厄瓜多爾, 厄立特里亞, 吉布提, 吉爾吉斯, 哈薩克, 哥倫比亞, 哥斯達黎加, 喀麥隆, 土庫斯安德凱科斯群島, 土庫曼, 土耳其, 圭亞那, 坦桑尼亞, 埃及, 埃塞俄比亞, 基里巴斯, 塔吉克, 塞內加爾, 塞拉利昂, 塞浦路斯, 塞爾維亞, 塞舌爾, 墨西哥, 多哥, 多明尼加共和國, 奧地利, 孟加拉, 安哥拉, 安圭拉島, 安提瓜和巴布達, 安道爾, 寮國, 尼加拉瓜, 尼日利亞, 尼日爾, 尼泊爾, 巴哈馬, 巴基斯坦, 巴布亞新畿內亞, 巴拉圭, 巴拿馬, 巴林, 巴西, 布基納法索, 布隆迪, 希臘, 幾內亞, 幾內亞比索, 德國, 意大利, 愛沙尼亞, 愛爾蘭, 所羅門群島, 拉脫維亞, 挪威, 捷克共和國, 摩洛哥, 摩爾多瓦, 摩納哥, 斐濟, 斯威士蘭, 斯洛伐克, 斯洛文尼亞, 斯里蘭卡, 新加坡, 日本, 智利, 柬埔寨, 格陵蘭, 格雷納達, 格魯吉亞, 梵蒂岡, 比利時, 毛里求斯, 汶萊, 沙特阿拉伯, 法國, 波斯尼亞和黑塞哥維那, 波蘭, 泰國, 津巴布韋, 洪都拉斯, 海地, 湯加, 澳洲, 烏干達, 烏拉圭, 烏茲別克, 牙買加, 特里尼達和多巴哥, 玻利維亞, 瑙魯, 瑞典, 瑞士, 瓦利斯和富圖納群島, 瓦努阿圖, 甘比亞, 百慕達群島, 盧旺達, 盧森堡, 直布羅陀, 科威特, 科特迪瓦(象牙海岸), 秘魯, 突尼斯, 立陶宛, 約旦, 納米比亞, 紐西蘭, 羅馬尼亞, 美國, 聖基茨-尼維斯, 聖文森和格瑞那丁, 聖盧西亞, 聖馬力諾, 肯亞, 芬蘭, 英國, 茅利塔尼亞, 荷蘭, 莫桑比克, 菲律賓, 萊索托, 葡萄牙, 蒙古, 蒙特色拉特島, 薩爾瓦多, 蘇里南, 西班牙, 西薩摩亞, 貝寧, 贊比亞, 赤道幾內亞, 越南, 開曼群島, 阿富汗, 阿拉伯聯合酋長國, 阿曼, 阿根廷, 阿爾及利亞, 阿爾巴尼亞, 阿魯巴, 馬來西亞, 馬其頓, 馬拉維, 馬爾代夫, 馬耳他, 馬達加斯加, 馬里, 黎巴嫩, 黑山
排除:
俄羅斯聯邦, 利比亞, 委內瑞拉, 巴貝多, 新喀里多尼亞, 法屬圭亞那, 法屬玻里尼西亞, 烏克蘭, 瓜德羅普島, 留尼汪島, 馬提尼克島
運費與處理費 | 運送地點 | 運送方式 | 運送*查看送達備註 |
---|---|---|---|
US $4.87(大約 HK$ 37.99) | 美國 | 經濟運送方式 (USPS Media MailTM) | 估計於 5月24日, 五至 5月28日, 二之間送達 運送地點 43230 |
處理時間 |
---|
通常會在收到所有款項後的 3 個工作日內發貨。 |
稅項 |
---|
結賬時相關稅項可能適用。 進一步了解進一步了解為 eBay 購物繳稅。 |
物品編號 285809585241 的銷售稅
物品編號 285809585241 的銷售稅
賣家會對寄往以下各州的物品收取銷售稅:
州/省 | 銷售稅稅率 |
---|
退貨政策
退貨政策說明 |
---|
賣家不接受此物品的退貨。 |
賣家信用評價 (94)
p***5 (12)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Easy process, fair quality
a***r (1286)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Excellent Seller, the book is great!!!
8***0 (33)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Item arrived as described, and earlier than predicted! Couldn't be happier! Great seller! :)