Advanced persistent threat hacking : the art and science of hacking any organization / Tyler Wrightson.
By: Wrightson, Tyler [author.]
Language: English Publisher: New York : McGraw-Hill Education, [2015]Copyright date: ©2015Description: xxi, 440 pages : illustrations ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780071828369; 0071828362Subject(s): Hacking | Computer security | Computer security | HackingDDC classification: 005.8 LOC classification: QA76.9.A25 | W765 2015Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance – Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
BOOK | COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 005.8 W938 2015 (Browse shelf) | Available | CITU-CL-46425 |
Total holds: 0
Browsing COLLEGE LIBRARY Shelves , Shelving location: SUBJECT REFERENCE Close shelf browser
005.8 W38 2003 Web services security / | 005.8 W593 2010 Management of information security / | 005.8 W593 2016 Principles of information security / | 005.8 W938 2015 Advanced persistent threat hacking : the art and science of hacking any organization / | 005.82 H266 2011 Security strategies in Web applications and social networking / | 005.82 H2758 2017 Data hiding techniques in Windows OS : a practical approach to investigation and defense / | 005.82 W658 2023 Introduction to modern cryptography and network security / |
Includes index.
Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance – Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors
There are no comments for this item.