did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071828369

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization

by
  • ISBN13:

    9780071828369

  • ISBN10:

    0071828362

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2014-12-15
  • Publisher: McGraw Hill

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $55.00 Save up to $19.25
  • Rent Book $35.75
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.

  • Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike
  • Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
  • Perform in-depth reconnaissance to build a comprehensive understanding of the target
  • Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
  • Use social engineering to compromise a specific system, application, or workstation
  • Identify and attack wireless networks and wireless client devices
  • Spearphish with hardware-based Trojan devices
  • Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Table of Contents

Preface

Ch 1. Introduction to APT Offensive Posture

Ch 2. Empirical Data

Ch 3. An APT Offensive - Methodology

Ch. 4. An Approach to Reconnaissance

Ch 5. Social Engineering

Ch 6. Physical Security & Hardware Security

Ch. 7. Mobile Threats

Ch 8. External-Internal Threats

Ch 9. Backdoors

Ch 10. Defenses

References

Appendices

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program