Reveals and dissects the technical aspect of many social engineering maneuvers. From elicitation, pretexting, influence and manipulation, this book discusses and explains various aspects of social engineering, using real world examples, personal experience and the science behind them to unravel the mystery in social engineering.
Shows you how to see the digital world just below the surface of daily life. This title utilizes actual hacking and security tools and helps to familiarize a newbie with the many devices and their code. It introduces basic hacking techniques in real life context for ease of learning.
Takes the reader on a global trip through the world of computer security exploits. This book helps you learn about hacking tools and techniques and how to defend your network against threats. Utilizing actual hacking and security tools, it helps to familiarize a newbie with the many devices and their code. It introduces basic hacking techniques.
Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. This book provides background information for three types of attacks against computers.
The hacking industry costs corporations, governments and individuals milliions of dollars each year. This title focuses on the everyday hacks that, while simple in nature, actually add up to the significant losses. It contains descriptions of potential threats and vulnerabilities.
Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground.
Identity theft and other confidential information theft have topped the charts as the number 1 cybercrime. In particular, credit card data is preferred by cybercriminals. This title offers guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data.
Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly.
In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. This book reveals the author's secrets to bypass different high-tech security systems.
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This title shows the reader how these rootkits are developed and how this attack can change the managed code that a computer is running.
Lists the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Offers an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. It covers Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, and more.
An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
Details the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. This title helps you discover the best ways to defend against these vicious hacks with step-by-step instructions.
Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.
Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use in the 2010s - and how to guard against them, or apply them yourself to start learning the art of information retrieval.
Offers coverage of some of the most devastating hacks and how to prevent them. Using the authors' methodology, this book reveals how to locate and patch system vulnerabilities. It also covers ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, and mobile devices.
Focuses on Vista with hacks and workarounds that also work for Windows XP. This book takes readers beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, the wireless router, and the PC.
How can an information security professional keep up with the hacks, attacks, and exploits? This book deals with the anatomy of these attacks and also tells you how to get rid of them and how to defend against them. It details the countermeasures so that you can fight against similar attacks as they evolve.
Discusses techniques used by malicious attackers in real-world situations; details unorthodox penetration testing techniques by getting inside the mind of a ninja; and, expands upon penetration testing methodologies including new tactics for hardware and physical attacks.
Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems.
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field.
Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth.
Offers many tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the line of iPods, iPhone, and Apple TV. This book includes: "Quick Hacks" for tweaking system and gadget settings in minutes; hacks for adjusting Mac OS X applications; and hacks and tips for the Mac mini, the MacBook laptops, and Intel desktops.
Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. This book helps you create a personal penetration test lab that can deal with real-world vulnerability scenarios.