O'Reilly logo

Low Tech Hacking by Sean Lowther, Russ Rogers, Jennifer Jabbusch, Terry Gudaitis, Jack Wiles

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction
—Jennifer (Jabbusch) Minella, CISSP
CISO, Infrastructure Security Specialist Carolina Advanced Digital, Inc.
INFORMATION IN THIS CHAPTER:
• Book Overview and Key Learning Points
• Book Audience
• How this Book is Organized

Book overview and key learning points

This book arms any reader with the knowledge of how security measures can often be bypassed in situations ranging from physical security to networked enterprise systems—all with minimal technology savvy on the part of the offender. And, although seven of the eight chapters here detail security evasion methods, the true value of the book is realized in the countermeasures provided for each of the attack scenarios detailed.
In a world of content that capitalizes on vulnerability, risk, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required