53,99 €
inkl. MwSt.
Versandkostenfrei*
Liefertermin unbestimmt
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
27 °P sammeln
- Broschiertes Buch
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security
Andere Kunden interessierten sich auch für
- Roger A. GrimesHacking Multifactor Authentication35,99 €
- Izar TarandachThreat Modeling56,99 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity57,99 €
- Kevin Lynn McLaughlinCybersecurity Operations and Fusion Centers69,99 €
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 152,99 €
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 252,99 €
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 236,99 €
-
-
-
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Osborne / McGraw-Hill Professional
- 1st ed.
- Seitenzahl: 464
- Erscheinungstermin: 15. Dezember 2014
- Englisch
- Abmessung: 234mm x 187mm x 27mm
- Gewicht: 695g
- ISBN-13: 9780071828369
- ISBN-10: 0071828362
- Artikelnr.: 39373712
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: McGraw-Hill Osborne / McGraw-Hill Professional
- 1st ed.
- Seitenzahl: 464
- Erscheinungstermin: 15. Dezember 2014
- Englisch
- Abmessung: 234mm x 187mm x 27mm
- Gewicht: 695g
- ISBN-13: 9780071828369
- ISBN-10: 0071828362
- Artikelnr.: 39373712
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Tyler Wrightson is the author of Advanced Persistent Threats and Wireless Network Security: A Beginner's Guide. Tyler is the founder and president of Leet Systems, which provides offensive security services such as Penetration Testing and Red Teaming to secure organizations against real world attackers. Tyler has over twelve years experience in the IT security field with extensive experience in all forms of offensive security and penetration testing. Tyler holds industry certifications for CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, wireless security, and network security. He has been a frequent speaker at industry conferences including Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com.
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors