unconventional penetration testing tactics and techniques /
نام نخستين پديدآور
Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Boston :
نام ناشر، پخش کننده و غيره
Syngress/Elsevier,
تاریخ نشرو بخش و غیره
c2011.
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به تکثیر
متن يادداشت
Access may be restricted to users at subscribing institutions.
یادداشتهای مربوط به مندرجات
متن يادداشت
Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Ninja hacking.
شماره استاندارد بين المللي کتاب و موسيقي
9781597495882
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Business enterprises-- Computer networks-- Security measures.
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )