Coverart for item
The Resource Chained exploits : advanced hacking attacks from start to finish, Andrew Whitaker, Keatron Evans, Jack B. Voth

Chained exploits : advanced hacking attacks from start to finish, Andrew Whitaker, Keatron Evans, Jack B. Voth

Label
Chained exploits : advanced hacking attacks from start to finish
Title
Chained exploits
Title remainder
advanced hacking attacks from start to finish
Statement of responsibility
Andrew Whitaker, Keatron Evans, Jack B. Voth
Creator
Contributor
Subject
Language
eng
Summary
The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's a book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them. Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today's most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering. Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today's most effective countermeasures- both technical and human. Coverage includes: Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors' Web sites Performing-and preventing-corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council's Instructor of Excellence Award. Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council's Instructor of Excellence Award. Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Incorporated, and teaches for Training Camp throughout the United States and abroad. informit.com/aw Cover photograph © Corbis / Jupiter Images $49.99 US $59.99 CANADA
Member of
Cataloging source
UMI
http://library.link/vocab/creatorName
Whitaker, Andrew
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
W44 2009
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Evans, Keatron
  • Voth, Jack B
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Hackers
  • Computer security
  • Computer networks
  • Computer hackers
  • Hackers
  • Computer networks
  • Computer security
Label
Chained exploits : advanced hacking attacks from start to finish, Andrew Whitaker, Keatron Evans, Jack B. Voth
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Control code
317878896
Dimensions
unknown
Extent
1 online resource (xix, 279 pages)
Form of item
online
Isbn
9780321620613
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9786612432446
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000037
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)317878896
Label
Chained exploits : advanced hacking attacks from start to finish, Andrew Whitaker, Keatron Evans, Jack B. Voth
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Control code
317878896
Dimensions
unknown
Extent
1 online resource (xix, 279 pages)
Form of item
online
Isbn
9780321620613
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9786612432446
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000037
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)317878896

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...