did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization

9780071828369

Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization

  • ISBN 13:

    9780071828369

  • ISBN 10:

    0071828362

  • Edition: 1st
  • Format: Paperback
  • Copyright: 12/15/2014
  • Publisher: McGraw Hill

List Price $55.00 Save

Rent $31.86
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $55.00 Save $13.21

Used $41.79

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

List Price $55.00 Save $1.92

New $53.08

Usually Ships in 2-3 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.

  • Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike
  • Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
  • Perform in-depth reconnaissance to build a comprehensive understanding of the target
  • Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
  • Use social engineering to compromise a specific system, application, or workstation
  • Identify and attack wireless networks and wireless client devices
  • Spearphish with hardware-based Trojan devices
  • Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Table of Contents

Read more