Imagen 1 de 5
HACKING DE BAJA TECNOLOGÍA: STREET SMARTS PARA PROFESIONALES DE LA SEGURIDAD por Jack Wiles & Terry-
Estado:
Envío:
Ubicado en: Memphis, Tennessee, Estados Unidos
Entrega:
Entrega prevista entre el jue. 23 may. y el mar. 28 may. a 43230
Devoluciones:
Pagos:
Compra con confianza
Información del vendedor
Registrado como vendedor particular, por lo que no se aplican los derechos de los consumidores derivados de la ley de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de las compras.Más informaciónRegistrado como vendedor particular
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:285809585241
Características del artículo
- Estado
- Book Title
- Low Tech Hacking: Street Smarts for Security Professionals
- Item Height
- 9.25 inches
- ISBN-10
- 1597496650
- Item Weight
- 1.2 pounds
- ISBN
- 9781597496650
- Publication Year
- 2012
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Publication Name
- Low Tech Hacking : Street Smarts for Security Professionals
- Item Length
- 9.2in
- Publisher
- Elsevier Science & Technology Books
- Item Width
- 7.5in
- Number of Pages
- 264 Pages
Acerca de este producto
Product Information
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
Product Identifiers
Publisher
Elsevier Science & Technology Books
ISBN-10
1597496650
ISBN-13
9781597496650
eBay Product ID (ePID)
109011219
Product Key Features
Publication Name
Low Tech Hacking : Street Smarts for Security Professionals
Format
Trade Paperback
Language
English
Publication Year
2012
Type
Textbook
Number of Pages
264 Pages
Dimensions
Item Length
9.2in
Item Width
7.5in
Additional Product Features
Lc Classification Number
Qa76.9.A25
Reviews
"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc., "In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack.Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker.The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing."-- Security Management, February 2013 and other publications "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com "All in all, Low Tech Hacking is a great overview of unconventional offensive and defensive methods to secure an organization. It will not make testers experts on physical security or wireless attacks all of a sudden, but it is a lively and useful starting point for further reading and training and a handy reference during an audit, too."-- Computers and Security 31 {2012} 738, "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com, "In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack...Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker...The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing."-- Security Management, February 2013 and other publications "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc. " Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' 'war stories' as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org "While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures." --iWeek Magazine.com "All in all, Low Tech Hacking is a great overview of unconventional offensive and defensive methods to secure an organization. It will not make testers experts on physical security or wireless attacks all of a sudden, but it is a lively and useful starting point for further reading and training and a handy reference during an audit, too."-- Computers and Security 31 {2012} 738, "In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."-- Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.
Table of Content
Foreword by Paul A. Henry Introduction Chapter 1. Social Engineering--The Ultimate Low Tech Hacking Threat Chapter 2. Low Tech Vulerabilities--Physical Security Chapter 3. More About Locks and Ways to Low Tech Hack Them Chapter 4. Low Tech Wireless Hacking Chapter 5. Low Tech Targeting and Surveillance--How Much Could They Find Out About You? Chapter 6. Low Tech Hacking for the Penetration Tester Chapter 7. Low Tech Hacking and the Law--Where Can You Go For Help? Chapter 8. Information Security Awareness Training: Your Most Valuable Countermeasure to Employee Risk
Copyright Date
2012
Target Audience
Scholarly & Professional
Topic
Security / General, Information Management, Information Technology
Dewey Decimal
005.8
Dewey Edition
22
Illustrated
Yes
Genre
Computers, Business & Economics
Descripción del artículo del vendedor
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:285809585241
Envío y manipulación
Ubicación del artículo:
Memphis, Tennessee, Estados Unidos
Realiza envíos a:
Afganistán, Albania, Alemania, Andorra, Angola, Anguila, Antigua y Barbuda, Arabia Saudí, Argelia, Argentina, Armenia, Aruba, Australia, Austria, Azerbaiyán, Bahamas, Bahréin, Bangladés, Belice, Benín, Bermudas, Bolivia, Bosnia-Herzegovina, Botsuana, Brasil, Brunéi, Bulgaria, Burkina Faso, Burundi, Bután, Bélgica, Cabo Verde, Camboya, Camerún, Canadá, Chad, Chile, China, Chipre, Colombia, Corea del Sur, Costa Rica, Costa de Marfil, Dinamarca, Ecuador, Egipto, El Salvador, Emiratos Árabes Unidos, Eritrea, Eslovaquia, Eslovenia, España, Estados Unidos, Estonia, Etiopía, Fiji, Filipinas, Finlandia, Francia, Gabón, Gambia, Georgia, Ghana, Gibraltar, Granada, Grecia, Groenlandia, Guatemala, Guinea, Guinea Ecuatorial, Guinea-Bisáu, Guyana, Haití, Honduras, Hong Kong, Hungría, India, Indonesia, Irlanda, Islandia, Islas Caimán, Islas Salomón, Islas Turcas y Caicos, Israel, Italia, Jamaica, Japón, Jordania, Kazajistán, Kenia, Kirguistán, Kiribati, Kuwait, Laos, Lesoto, Letonia, Liberia, Liechtenstein, Lituania, Luxemburgo, Líbano, Macao, Macedonia, Madagascar, Malasia, Malaui, Maldivas, Malta, Malí, Marruecos, Mauricio, Mauritania, Moldavia, Mongolia, Montenegro, Montserrat, Mozambique, México, Mónaco, Namibia, Nauru, Nepal, Nicaragua, Nigeria, Noruega, Nueva Zelanda, Níger, Omán, Pakistán, Panamá, Papúa Nueva Guinea, Paraguay, Países Bajos, Perú, Polonia, Portugal, Qatar, Reino Unido, República Centroafricana, República Checa, República Democrática del Congo, República Dominicana, República de Croacia, República del Congo, Ruanda, Rumanía, Samoa, San Cristóbal y Nieves, San Marino, San Vicente y las Granadinas, Santa Lucía, Senegal, Serbia, Seychelles, Sierra Leona, Singapur, Sri Lanka, Suazilandia, Sudáfrica, Suecia, Suiza, Surinam, Tailandia, Taiwán, Tanzania, Tayikistán, Togo, Tonga, Trinidad y Tobago, Turkmenistán, Turquía, Túnez, Uganda, Uruguay, Uzbekistán, Vanuatu, Vaticano, Vietnam, Wallis y Futuna, Yemen, Yibuti, Zambia, Zimbabue
Excluye:
Barbados, Federación Rusa, Guadalupe, Guayana Francesa, Libia, Martinica, Nueva Caledonia, Polinesia Francesa, Reunión, Ucrania, Venezuela
Envío y manipulación | A | Servicio | Entrega*Consulta las notas de entrega |
---|---|---|---|
USD4,87 (aprox. 4,48 EUR) | Estados Unidos | Envío Económico (USPS Media MailTM) | Entrega prevista entre el jue. 23 may. y el mar. 28 may. a 43230 |
Tiempo de manipulación |
---|
Normalmente, se enviará en un plazo de 3 días laborables desde que se haga efectivo el pago. |
Impuestos |
---|
Puede que se apliquen impuestos durante el pago y envío. Más informaciónMás información sobre el pago de impuestos en las compras de eBay. |
Impuesto de ventas del artículo 285809585241
Impuesto de ventas del artículo 285809585241
El vendedor carga un impuesto de ventas por los artículos enviados a los siguientes estados:
Estado o provincia | Porcentaje de impuesto de ventas |
---|
Política de devoluciones
Detalles de la política de devoluciones |
---|
El vendedor no acepta la devolución de este artículo. |
Pulsa aquíaquí para obtener más información sobre devoluciones. En las transacciones que cumplan los requisitos necesarios, estarás cubierto por la Garantía al cliente de eBay si recibiste un artículo que es distinto de la descripción que aparece en el anuncio.
Detalles de pago
Formas de pago
Nota: como resultado de la valoración de riesgo del comprador, es posible que algunas formas de pago no estén disponibles en el proceso de Pago y envío.
Registrado como vendedor particular
Por tanto, no se aplican los derechos de los consumidores derivados de las leyes de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más informaciónMás información
Votos de vendedor (94)
p***5 (12)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
Easy process, fair quality
a***r (1286)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
Excellent Seller, the book is great!!!
8***0 (33)- Votos emitidos por el comprador.
Mes pasado
Compra verificada
Item arrived as described, and earlier than predicted! Couldn't be happier! Great seller! :)