Book description
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
- Learn how "inside out" techniques can poke holes into protected networks
- Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
- Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
- Prevent attacks against the mobile workforce and their devices containing valuable data
- Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
- Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
Publisher resources
Table of contents
-
Hacking: The Next Generation
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
- Preface
- 1. Intelligence Gathering: Peering Through the Windows to Your Organization
- 2. Inside-Out Attacks: The Attacker Is the Insider
- 3. The Way It Works: There Is No Patch
- 4. Blended Threats: When Applications Exploit Each Other
- 5. Cloud Insecurity: Sharing the Cloud with Your Enemy
- 6. Abusing Mobile Devices: Targeting Your Mobile Workforce
- 7. Infiltrating the Phishing Underground: Learning from Online Criminals?
- 8. Influencing Your Victims: Do What We Tell You, Please
- 9. Hacking Executives: Can Your CEO Spot a Targeted Attack?
- 10. Case Studies: Different Perspectives
- A. Chapter 2 Source Code Samples
- B. Cache_Snoop.pl
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
Product information
- Title: Hacking: The Next Generation
- Author(s):
- Release date: August 2009
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781449379216
You might also like
book
Metasploit
"The best guide to the Metasploit Framework."HD Moore, Founder of the Metasploit Project The Metasploit Framework …
book
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness …
book
Hands on Hacking
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the …
video
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
More Than 5 Hours of Video Instruction More than 5 hours of video instruction to help …