Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

The Art of Deception

Controlling the Human Element of Security
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780764538391
Veröffentl:
2011
Einband:
E-Book
Seiten:
368
Autor:
Kevin D. Mitnick
eBook Typ:
EPUB
eBook Format:
Reflowable
Kopierschutz:
2 - DRM Adobe
Sprache:
Englisch
Beschreibung:

The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrelease from federal prison, in 1998, Mitnick has turned his lifearound and established himself as one of the most sought-aftercomputer security experts worldwide. Now, in The Art of Deception,the world's most notorious hacker gives new meaning to the oldadage, "It takes a thief to catch a thief."Focusing on the human factors involved with information security,Mitnick explains why all the firewalls and encryption protocols inthe world will never be enough to stop a savvy grifter intent onrifling a corporate database or an irate employee determined tocrash a system. With the help of many fascinating true stories ofsuccessful attacks on business and government, he illustrates justhow susceptible even the most locked-down information systems areto a slick con artist impersonating an IRS agent. Narrating fromthe points of view of both the attacker and the victims, heexplains why each attack was so successful and how it could havebeen prevented in an engaging and highly readable style reminiscentof a true-crime novel. And, perhaps most importantly, Mitnickoffers advice for preventing these types of social engineeringhacks through security protocols, training programs, and manualsthat address the human element of security.
Foreword.Preface.Introduction.Part 1: Behind the Scenes.Chapter 1: Security's Weakest Link.Part 2: The Art of the Attacker.Chapter 2: When Innocuous Information Isn't.Chapter 3: The Direct Attack: Just Asking for It.Chapter 4: Building Trust.Chapter 5: "Let Me Help You".Chapter 6: "Can You Help Me?".Chapter 7: Phony Sites and Dangerous Attachments.Chapter 8: Using Sympathy, Guilt, and Intimidation.Chapter 9: The Reverse Sting.Part 3: Intruder Alert.Chapter 10: Entering the Premises.Chapter 11: Combining Technology and Social Engineering.Chapter 12: Attacks on the Entry-Level Employee.Chapter 13: Clever Cons.Chapter 14: Industrial Espionage.Part 4: Raising the Bar.Chapter 15: Information Security Awareness and Training.Chapter 16: Recommended Corporate Information SecurityPolicies.Security at a Glance.Sources.Acknowledgments.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga