feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (1)
  • Computer Science  (1)
  • Electronic books  (1)
  • Graue Literatur
Type of Medium
  • Online Resource  (1)
Language
Region
Library
Years
Subjects(RVK)
Access
  • 1
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Oxford : Elsevier Science
    UID:
    gbv_1651320438
    Format: Online Ressource (xix, 243 pages) , illustrations
    Edition: Online-Ausg.
    ISBN: 1597496650 , 9781597496650 , 9781597496667 , 9781283394130 , 1283394138
    Content: Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk
    Note: Includes index. - Includes bibliographical references and index , Front Cover; Low Tech Hacking: Street Smarts for Security Professionals; Copyright; Contents; Acknowledgments; Foreword; About the Authors; Introlduction; Book Overview and Key Learning Points; Book Audience; How this Book is Organized; Chapter 1: Social engineering: The ultimate low tech hacking threat; Chapter 2: Low tech vulnerabilities: Physical security; Chapter 3: More about locks and ways to low tech hack them; Chapter 4: Low tech wireless hacking; Chapter 5: Low tech targeting and surveillance: How much could they find out about you? , Chapter 6: Low tech hacking for the penetration testerChapter 7: Low tech hacking and the law: Where can you go for help?; Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk; Conclusion; Chapter 1: Social engineering: The ultimate low tech hacking threat; How Easy is it?; The Mind of a Social Engineer; The mind of a victim; Tools of The Social Engineering Trade; One of my favorite tools of the trade; Social engineering would never work against our company; What Was I Able to Social Engineer Out of Mary? , The Final Sting-Two weeks Later-Friday AfternoonWhy did this scam work?; Let's look at a few more social engineering tools; Keystroke logger: Is there one under your desk?; One of my lunchtime tools; Let's look at that Telephone butt-in set on my tool belt; Meet Mr. Phil Drake; Meet Mr. Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?; A few possible countermeasures; Always be slightly suspicious; Start to study the art of social engineering; Start a social engineering book library , SummaryChapter 2: Low tech vulnerabilities: Physical security; A mini risk assessment; What did I have at risk?; What were some possible threats while out on the lake?; What were some of the possible vulnerabilities?; And finally, what about my countermeasures?; Outsider-Insider Threats; Some things to consider for the security of your buildings; Check all locks for proper operation; Use employee badges; Shredder technology keeps changing as well; Keep an eye on corporate or agency phone books; Unsecured areas are targets for tailgating; Special training for off-shift staff , Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?; Purchasing better quality locks will be cost effective; Be aware of lock vulnerabilities; Forced entry-and other ways to cheat! , A time-tested low tech method of forced entry
    Additional Edition: ISBN 1597496650
    Additional Edition: Druckausg. Low tech hacking Amsterdam [u.a.] : Syngress, 2012 ISBN 9781597496650
    Additional Edition: ISBN 1597496650
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages