Cargando…

Art of attack : attacker mindset for security professionals.

The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Reynolds, Maxie (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : John Wiley & Sons, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1260344935
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 210717s2021 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d OCLCO  |d UKAHL  |d OCLCF  |d N$T  |d UKMGB  |d TEFOD  |d OCLCQ  |d LIV  |d OCLCO  |d IEEEE  |d OCLCQ  |d OCLCO 
015 |a GBC1B5854  |2 bnb 
016 7 |a 020266720  |2 Uk 
019 |a 1260191134  |a 1260193158  |a 1262317311  |a 1264371105 
020 |a 1119805473 
020 |a 9781119806288  |q (electronic bk.) 
020 |a 1119806283  |q (electronic bk.) 
020 |a 9781119805472  |q (electronic bk.) 
020 |a 9781394177486  |q (electronic bk.) 
020 |a 1394177488  |q (electronic bk.) 
020 |z 1119805465 
020 |z 9781119805465 
024 7 |a 10.1002/9781394177486  |2 doi 
029 1 |a AU@  |b 000069704374 
029 1 |a UKMGB  |b 020266720 
035 |a (OCoLC)1260344935  |z (OCoLC)1260191134  |z (OCoLC)1260193158  |z (OCoLC)1262317311  |z (OCoLC)1264371105 
037 |a 9781119805472  |b Wiley 
037 |a 89E0C72F-838C-459B-B875-C5389DDE232B  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9946655  |b IEEE 
050 4 |a QA76.9.A25  |b R49 2021 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Reynolds, Maxie,  |e author. 
245 1 0 |a Art of attack :  |b attacker mindset for security professionals. 
264 1 |a [Place of publication not identified] :  |b John Wiley & Sons,  |c 2021. 
300 |a 1 online resource (307 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents -- Introduction -- Who Is This Book For? -- What This Book Covers -- Part I The Attacker Mindset -- Chapter 1 What Is the Attacker Mindset? -- Using the Mindset -- The Attacker and the Mindset -- AMs Is a Needed Set of Skills -- A Quick Note on Scope -- Summary -- Key Message -- Chapter 2 Offensive vs. Defensive Attacker Mindset -- The Offensive Attacker Mindset -- Comfort and Risk -- Planning Pressure and Mental Agility -- Emergency Conditioning -- Defensive Attacker Mindset -- Consistency and Regulation 
505 8 |a Anxiety Control -- Recovery, Distraction, and Maintenance -- OAMs and DAMs Come Together -- Summary -- Key Message -- Chapter 3 The Attacker Mindset Framework -- Development -- Phase 1 -- Phase 2 -- Application -- Preloading -- "Right Time, Right Place" Preload -- Ethics -- Intellectual Ethics -- Reactionary Ethics -- Social Engineering and Security -- Social Engineering vs. AMs -- Summary -- Key Message -- Part II The Laws and Skills -- Chapter 4 The Laws -- Law 1: Start with the End in Mind -- End to Start Questions -- Robbing a Bank -- Bringing It All together -- The Start of the End 
505 8 |a Clarity -- EfficiencyWhen you begin -- The Objective -- How to Begin with the End in Mind -- Law 2: Gather, Weaponize, and Leverage Information -- Law 3: Never Break Pretext -- Law 4: Every Move Made Benefits the Objective -- Summary -- Key Message -- Chapter 5 Curiosity, Persistence, and Agility -- Curiosity -- The Exercise: Part 1 -- The Exercise: Part 2 -- Persistence -- Skills and Common Sense -- Professional Common Sense -- Summary -- Key Message -- Chapter 6 Information Processing: Observation and Thinking Techniques -- Your Brain vs. Your Observation -- Observation vs. Heuristics 
505 8 |a Heuristics -- Behold Linda -- Observation vs. Intuition -- Using Reasoning and Logic -- Observing People -- Observation Exercise -- AMs and Observation -- Tying It All Together -- Critical and Nonlinear Thinking -- Vector vs. Arc -- Education and Critical Thinking -- Workplace Critical Thinking -- Critical Thinking and Other Psychological Constructs -- Critical Thinking Skills -- Nonlinear Thinking -- Tying Them Together -- Summary -- Key Message -- Chapter 7 Information Processing in Practice -- Reconnaissance -- Recon: Passive -- Recon: Active -- OSINT -- OSINT Over the Years -- Intel Types 
505 8 |a Alternative Data in OSINT -- Signal vs. Noise -- Weaponizing of Information -- Tying Back to the Objective -- Summary -- Key Message -- Part III Tools and Anatomy -- Chapter 8 Attack Strategy -- Attacks in Action -- Strategic Environment -- The Necessity of Engagement and Winning -- The Attack Surface -- Vulnerabilities -- AMs Applied to the Attack Vectors -- Phishing -- Mass Phish -- Spearphish -- Whaling -- Vishing -- Smishing/Smshing -- Impersonation -- Physical -- Back to the Manhattan Bank -- Summary -- Key Message -- Chapter 9 Psychology in Attacks 
500 |a Setting The Scene: Why Psychology Matters. 
520 |a The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. --  |c Edited summary from book. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Reynolds, Maxie.  |t Art of Attack.  |d Newark : John Wiley & Sons, Incorporated, ©2021  |z 9781119805465 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119805465/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39022480 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6675133 
938 |a EBSCOhost  |b EBSC  |n 2964488 
938 |a YBP Library Services  |b YANK  |n 302327098 
938 |a YBP Library Services  |b YANK  |n 17542296 
994 |a 92  |b IZTAP