0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Buy Now

Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback) Loot Price: R781
Discovery Miles 7 810
Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback): Thomas Wilhelm, Jason Andress

Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback)

Thomas Wilhelm, Jason Andress

 (sign in to rate)
Loot Price R781 Discovery Miles 7 810 | Repayment Terms: R73 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: November 2010
First published: October 2010
Authors: Thomas Wilhelm • Jason Andress
Dimensions: 235 x 191 x 20mm (L x W x T)
Format: Paperback
Pages: 336
ISBN-13: 978-1-59749-588-2
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Promotions
LSN: 1-59749-588-3
Barcode: 9781597495882

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

At Any Cost - The South African…
Stephen Timm Paperback R385 R344 Discovery Miles 3 440
Computer Crimes and Digital…
Ian Walden Hardcover  (1)
R5,062 Discovery Miles 50 620
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R474 Discovery Miles 4 740
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R324 R297 Discovery Miles 2 970
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, … Paperback R976 R760 Discovery Miles 7 600
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,330 Discovery Miles 23 300
Seven Deadliest Web Application Attacks
Mike Shema Paperback R577 Discovery Miles 5 770

See more

Partners