Contents at a Glance
Chapter 3 APT Hacker Methodology
Chapter 4 An APT Approach to Reconnaissance
Chapter 5 Reconnaissance: Nontechnical Data
Chapter 6 Spear Social Engineering
Chapter 7 Phase III: Remote Targeting
Chapter 8 Spear Phishing with Hardware Trojans
Chapter 9 Physical Infiltration
Chapter 10 APT Software Backdoors
Get Advanced Persistent Threat Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.