Cover art for Advanced Persistent Threats Offensive Tactics for IT Security
Published
Mcgraw-Hill Book Co, August 2014
ISBN
9780071828369
Format
Softcover, 464 pages
Dimensions
22.9cm × 18.5cm × 2.3cm

Advanced Persistent Threats Offensive Tactics for IT Security

Not in stock
Fast $7.95 flat-rate shipping!
Only pay $7.95 per order within Australia, including end-to-end parcel tracking.
100% encrypted and secure
We adhere to industry best practice and never store credit card details.
Talk to real people
Contact us seven days a week – our staff are here to help.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.

Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike

Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught

Perform in-depth reconnaissance to build a comprehensive understanding of the target

Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence

Use social engineering to compromise a specific system, application, or workstation

Identify and attack wireless networks and wireless client devices

Spearphish with hardware-based Trojan devices

Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Related books