51,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
- Broschiertes Buch
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security
Andere Kunden interessierten sich auch für
- Pierre-Luc PomerleauEvidence-Based Cybersecurity57,99 €
- Julian AshbournPKI Implementation and Infrastructures137,99 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World42,99 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World128,99 €
- Strategic Intelligence Management48,99 €
- Joseph MennCult of the Dead Cow11,99 €
- Richard A. ClarkeCyber War19,99 €
-
-
-
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Osborne / McGraw-Hill Professional
- 1st ed.
- Seitenzahl: 464
- Erscheinungstermin: 15. Dezember 2014
- Englisch
- Abmessung: 234mm x 187mm x 27mm
- Gewicht: 695g
- ISBN-13: 9780071828369
- ISBN-10: 0071828362
- Artikelnr.: 39373712
- Verlag: McGraw-Hill Osborne / McGraw-Hill Professional
- 1st ed.
- Seitenzahl: 464
- Erscheinungstermin: 15. Dezember 2014
- Englisch
- Abmessung: 234mm x 187mm x 27mm
- Gewicht: 695g
- ISBN-13: 9780071828369
- ISBN-10: 0071828362
- Artikelnr.: 39373712
Tyler Wrightson is the author of Advanced Persistent Threats and Wireless Network Security: A Beginner's Guide. Tyler is the founder and president of Leet Systems, which provides offensive security services such as Penetration Testing and Red Teaming to secure organizations against real world attackers. Tyler has over twelve years experience in the IT security field with extensive experience in all forms of offensive security and penetration testing. Tyler holds industry certifications for CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, wireless security, and network security. He has been a frequent speaker at industry conferences including Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com.
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors