|
Showing 1 - 2 of
2 matches in All Departments
Low Tech Hacking teaches your students how to avoid and defend
against some of the simplest and most common hacks. Criminals using
hacking techniques can cost corporations, governments, and
individuals millions of dollars each year. While the media focuses
on the grand-scale attacks that have been planned for months and
executed by teams and countries, there are thousands more that
aren't broadcast. This book focuses on the everyday hacks that,
while simple in nature, actually add up to the most significant
losses. It provides detailed descriptions of potential threats and
vulnerabilities, many of which the majority of the information
systems world may be unaware. It contains insider knowledge of what
could be your most likely low-tech threat, with timely advice from
some of the top security minds in the world. Author Jack Wiles
spent many years as an inside penetration testing team leader,
proving that these threats and vulnerabilities exist and their
countermeasures work. His contributing authors are among the best
in the world in their respective areas of expertise. The book is
organized into 8 chapters covering social engineering; locks and
ways to low tech hack them; low tech wireless hacking; low tech
targeting and surveillance; low tech hacking for the penetration
tester; the law on low tech hacking; and information security
awareness training as a countermeasure to employee risk. This book
will be a valuable resource for penetration testers, internal
auditors, information systems auditors, CIOs, CISOs, risk managers,
fraud investigators, system administrators, private investigators,
ethical hackers, black hat hackers, corporate attorneys, and
members of local, state, and federal law enforcement.
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
|
|