skip to content
Advanced persistent threat hacking : the art and science of hacking any organization Preview this item
ClosePreview this item
Checking...

Advanced persistent threat hacking : the art and science of hacking any organization

Author: Tyler Wrightson
Publisher: New York : McGraw-Hill Education, [2015] ©2015
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. He discusses the strategic issues that make organizations vulnerable and provides noteworthy evidence. Readers will learn a proven APT Hacker Methodology for targeting and infiltrating an organization and its IT systems. Coverage includes: a review of empirical data from actual attacks conducted by  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Tyler Wrightson
ISBN: 9780071828369 0071828362
OCLC Number: 857402061
Notes: Includes index.
Description: xxi, 440 pages : illustrations ; 24 cm
Contents: Empirical data --
An APT approach to reconnaissance --
Reconnaissance: nontechnical data --
Spear social engineering --
Phase III: remote targeting --
Spear phishing with hardware trojans --
Physical infiltrations --
APT software backdoors.
Responsibility: Tyler Wrightson.
More information:

Abstract:

Preventive strategies for deterring today's most malicious and least understood risks to enterprise security  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/857402061> # Advanced persistent threat hacking : the art and science of hacking any organization
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "857402061" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2276690373#Topic/hacking> ; # Hacking
   schema:about <http://experiment.worldcat.org/entity/work/data/2276690373#Topic/computers_security_networking> ; # COMPUTERS / Security / Networking
   schema:about <http://experiment.worldcat.org/entity/work/data/2276690373#Topic/computer_security> ; # Computer security
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:author <http://experiment.worldcat.org/entity/work/data/2276690373#Person/wrightson_tyler> ; # Tyler Wrightson
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2015" ;
   schema:datePublished "2015" ;
   schema:description "Empirical data -- An APT approach to reconnaissance -- Reconnaissance: nontechnical data -- Spear social engineering -- Phase III: remote targeting -- Spear phishing with hardware trojans -- Physical infiltrations -- APT software backdoors."@en ;
   schema:description "Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. He discusses the strategic issues that make organizations vulnerable and provides noteworthy evidence. Readers will learn a proven APT Hacker Methodology for targeting and infiltrating an organization and its IT systems. Coverage includes: a review of empirical data from actual attacks conducted by unsophisticated and elite APT hackers; APT Hacker Methodology; in-depth reconnaissance to build a comprehensive understanding of the target; non-technical data about the target, including open source, human, financial, and geographical intelligence; use of social engineering to compromise a specific system, application, or workstation; identification and attack of wireless networks and wireless client devices; Spearphish with hardware-based Trojan devices; and infiltrating target facilities to obtain access to assets and compromise digital lily pads. --"@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2276690373> ;
   schema:inLanguage "en" ;
   schema:name "Advanced persistent threat hacking : the art and science of hacking any organization"@en ;
   schema:productID "857402061" ;
   schema:url <https://www.loc.gov/catdir/enhancements/fy1610/2015288062-t.html> ;
   schema:workExample <http://worldcat.org/isbn/9780071828369> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/857402061> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2276690373#Person/wrightson_tyler> # Tyler Wrightson
    a schema:Person ;
   schema:familyName "Wrightson" ;
   schema:givenName "Tyler" ;
   schema:name "Tyler Wrightson" ;
    .

<http://experiment.worldcat.org/entity/work/data/2276690373#Topic/computers_security_networking> # COMPUTERS / Security / Networking
    a schema:Intangible ;
   schema:name "COMPUTERS / Security / Networking"@en ;
    .

<http://worldcat.org/isbn/9780071828369>
    a schema:ProductModel ;
   schema:isbn "0071828362" ;
   schema:isbn "9780071828369" ;
    .

<http://www.worldcat.org/title/-/oclc/857402061>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/857402061> ; # Advanced persistent threat hacking : the art and science of hacking any organization
   schema:dateModified "2017-10-22" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.