|
|
Showing 1 - 2 of
2 matches in All Departments
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
As you browse this book, you'll hear old familiar terms like
"dumpster diving," "social engineering," and "shoulder surfing."
Some of these terms have drifted into obscurity to the point of
becoming industry folklore; the tactics of the pre-dawn information
age. But make no mistake; these and other old-school tactics work
with amazing effectiveness today. In fact, there's a very good
chance that someone in your organization will fall victim to one or
more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big
boldletters above, and act surprised when I tell you hackers can
accomplish this without relying on a single bit of technology
(punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the
ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what
you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers,
most backed with years of hands-on experience. But what happens
when you take the age-old respected profession of the locksmith and
sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys,
CEOs and internal auditors on computer crime and security-related
topics. His unforgettable presentations are filled with three
decades of personal "war stories" from the trenches of Information
Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary
research. If he can make it to a public library, Kinko's or
Internet cafe, he can use Google to process all that data into
something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software,
no support from organized crime and no fancy gear. With all those
restrictions, is this guy still a threat to you? Have a look at
this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick
glances. In this chapter we'll take a look at a few examples of the
types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when
the kiosk holds airline passenger information? What if the kiosk
holds confidential patient information? What if the kiosk holds
cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular
espionage happens when the cars aren't moving at all!
Like it or not, your every move is being watched and analyzed.
Consumer's identities are being stolen, and a person's every step
is being tracked and stored. What once might have been dismissed as
paranoia is now a hard truth, and privacy is a luxury few can
afford or understand. In this explosive yet practical book, Kevin
Mitnick illustrates what is happening without your knowledge--and
he teaches you "the art of invisibility." Mitnick is the world's
most famous--and formerly the Most Wanted--computer hacker. He has
hacked into some of the country's most powerful and seemingly
impenetrable agencies and companies, and at one point he was on a
three-year run from the FBI. Now, though, Mitnick is reformed and
is widely regarded as the expert on the subject of computer
security. He knows exactly how vulnerabilities can be exploited and
just what to do to prevent that from happening. In THE ART OF
INVISIBILITY Mitnick provides both online and real life tactics and
inexpensive methods to protect you and your family, in easy
step-by-step instructions. He even talks about more advanced
"elite" techniques, which, if used properly, can maximize your
privacy. Invisibility isn't just for superheroes--privacy is a
power you deserve and need in this modern age.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|