Cargando…

Low tech hacking : street smarts for security professionals /

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Wiles, Jack, Gudaitis, Terry, Jabbusch, Jennifer, Rogers, Russ, Lowther, Sean
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, Mass. : Syngress, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_ocn769153669
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 120302s2012 maua ob 001 0 eng d
010 |a  2011284980 
040 |a VYR  |b eng  |e pn  |c DLC  |d VYR  |d HKP  |d OPELS  |d CDX  |d TEF  |d B24X7  |d DEBSZ  |d BTCTA  |d YDXCP  |d UKMGB  |d BWX  |d EUF  |d WSB  |d NJR  |d OKN  |d SINLB  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d CNCGM  |d UMI  |d COO  |d OCLCQ  |d Z5A  |d LIV  |d OCLCA  |d OCLCQ  |d U3W  |d LND  |d CEF  |d AU@  |d WYU  |d UAB  |d LEAUB  |d UKAHL  |d OL$  |d VT2  |d HSA  |d OCLCO  |d OCLCQ 
016 7 |a 015860620  |2 Uk 
019 |a 714729508  |a 770702681  |a 779775798  |a 796014519  |a 801811805  |a 962885726  |a 966355336  |a 1011986622  |a 1058171830  |a 1129366329  |a 1153019638  |a 1192348285  |a 1235838442  |a 1262681805  |a 1284822843  |a 1295120820 
020 |a 9781597496650 
020 |a 1597496650 
020 |a 9781597496667 
020 |a 1597496669 
029 1 |a AU@  |b 000050012864 
029 1 |a AU@  |b 000053281044 
029 1 |a CHBIS  |b 007226556 
029 1 |a CHVBK  |b 197894356 
029 1 |a DEBBG  |b BV040902088 
029 1 |a DEBBG  |b BV042314295 
029 1 |a DEBSZ  |b 360078931 
029 1 |a DEBSZ  |b 378295446 
029 1 |a DEBSZ  |b 381381536 
029 1 |a GBVCP  |b 785363602 
029 1 |a NZ1  |b 14775606 
029 1 |a CHNEW  |b 001010353 
035 |a (OCoLC)769153669  |z (OCoLC)714729508  |z (OCoLC)770702681  |z (OCoLC)779775798  |z (OCoLC)796014519  |z (OCoLC)801811805  |z (OCoLC)962885726  |z (OCoLC)966355336  |z (OCoLC)1011986622  |z (OCoLC)1058171830  |z (OCoLC)1129366329  |z (OCoLC)1153019638  |z (OCoLC)1192348285  |z (OCoLC)1235838442  |z (OCoLC)1262681805  |z (OCoLC)1284822843  |z (OCoLC)1295120820 
037 |a 339413  |b MIL 
042 |a lccopycat 
050 0 0 |a QA76.9.A25  |b L68 2012 
072 7 |a COM  |2 eflch 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Low tech hacking :  |b street smarts for security professionals /  |c Jack Wiles [and others]. 
260 |a Waltham, Mass. :  |b Syngress,  |c ©2012. 
300 |a 1 online resource (xix, 243 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk. 
520 |a Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a Computers and IT.  |2 eflch 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
700 1 |a Wiles, Jack. 
700 1 |a Gudaitis, Terry. 
700 1 |a Jabbusch, Jennifer. 
700 1 |a Rogers, Russ. 
700 1 |a Lowther, Sean. 
776 0 8 |i Print version:  |t Low tech hacking.  |d Waltham, Mass. : Syngress, ©2012  |w (DLC) 2011284980 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597496650/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21641886 
938 |a Books 24x7  |b B247  |n bks00044732 
938 |a Baker and Taylor  |b BTCP  |n BK0009785361 
938 |a Coutts Information Services  |b COUT  |n 20471011 
938 |a YBP Library Services  |b YANK  |n 7306572 
994 |a 92  |b IZTAP