skip to content
Low tech hacking : street smarts for security professionals Preview this item
ClosePreview this item
Checking...

Low tech hacking : street smarts for security professionals

Author: Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther
Publisher: Waltham, Mass. : Syngress, ©2012.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses.  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Low tech hacking.
Waltham, Mass. : Syngress, ©2012
(DLC) 2011284980
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther
ISBN: 9781597496650 1597496650 9781597496667 1597496669
OCLC Number: 769153669
Description: 1 online resource (xix, 243 pages) : illustrations
Contents: Social engineering: the ultimate low tech hacking threat --
Low tech vulnerabilities: physical security --
More about locks and ways to low tech hack them --
Low tech wireless hacking --
Low tech targeting and surveillance: how much could they find out about you? --
Low tech hacking for the penetration tester --
Low tech hacking and the law: where can you go for help? --
Information security awareness training: your most valuable countermeasure to employee risk.
Responsibility: Jack Wiles [and others].

Abstract:

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. This title contains descriptions of potential threats and vulnerabilities, many  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/769153669> # Low tech hacking : street smarts for security professionals
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "769153669" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1046130953#Place/waltham_mass> ; # Waltham, Mass.
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1046130953#Topic/computers_and_it> ; # Computers and IT
    schema:about <http://id.worldcat.org/fast/872150> ; # Hackers
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/46570603> ; # Jack Wiles
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1046130953#Person/lowther_sean> ; # Sean Lowther
    schema:contributor <http://viaf.org/viaf/313568686> ; # Jennifer Jabbusch
    schema:contributor <http://viaf.org/viaf/313568684> ; # Terry Gudaitis
    schema:contributor <http://viaf.org/viaf/56318045> ; # Russ Rogers
    schema:copyrightYear "2012" ;
    schema:datePublished "2012" ;
    schema:description "Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk."@en ;
    schema:description "Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1046130953> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1046130953#CreativeWork/low_tech_hacking> ;
    schema:name "Low tech hacking : street smarts for security professionals"@en ;
    schema:productID "769153669" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/769153669#PublicationEvent/waltham_mass_syngress_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1046130953#Agent/syngress> ; # Syngress
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=829964> ;
    schema:url <http://0-www.sciencedirect.com.pugwash.lib.warwick.ac.uk/science/book/9781597496650> ;
    schema:url <http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9781597496650> ;
    schema:url <http://www.myilibrary.com?id=339413> ;
    schema:url <http://proquest.safaribooksonline.com/9781597496650> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=44732> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597496650> ;
    schema:url <http://resolver.library.cornell.edu/cgi-bin/EBookresolver?set=Books24x7&id=44732> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781597496650> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597496650> ;
    schema:url <http://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=9781597496650> ;
    schema:workExample <http://worldcat.org/isbn/9781597496667> ;
    schema:workExample <http://worldcat.org/isbn/9781597496650> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/769153669> ;
    .


Related Entities

<http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9781597496650>
    rdfs:comment "E-book - Full text from ScienceDirect" ;
    .

<http://experiment.worldcat.org/entity/work/data/1046130953#Person/lowther_sean> # Sean Lowther
    a schema:Person ;
    schema:familyName "Lowther" ;
    schema:givenName "Sean" ;
    schema:name "Sean Lowther" ;
    .

<http://experiment.worldcat.org/entity/work/data/1046130953#Place/waltham_mass> # Waltham, Mass.
    a schema:Place ;
    schema:name "Waltham, Mass." ;
    .

<http://id.worldcat.org/fast/872150> # Hackers
    a schema:Intangible ;
    schema:name "Hackers"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://resolver.library.cornell.edu/cgi-bin/EBookresolver?set=Books24x7&id=44732>
    rdfs:comment "Connect to full text. Access restricted to authorized subscribers." ;
    .

<http://viaf.org/viaf/313568684> # Terry Gudaitis
    a schema:Person ;
    schema:familyName "Gudaitis" ;
    schema:givenName "Terry" ;
    schema:name "Terry Gudaitis" ;
    .

<http://viaf.org/viaf/313568686> # Jennifer Jabbusch
    a schema:Person ;
    schema:familyName "Jabbusch" ;
    schema:givenName "Jennifer" ;
    schema:name "Jennifer Jabbusch" ;
    .

<http://viaf.org/viaf/46570603> # Jack Wiles
    a schema:Person ;
    schema:familyName "Wiles" ;
    schema:givenName "Jack" ;
    schema:name "Jack Wiles" ;
    .

<http://viaf.org/viaf/56318045> # Russ Rogers
    a schema:Person ;
    schema:familyName "Rogers" ;
    schema:givenName "Russ" ;
    schema:name "Russ Rogers" ;
    .

<http://worldcat.org/entity/work/data/1046130953#CreativeWork/low_tech_hacking>
    a schema:CreativeWork ;
    rdfs:label "Low tech hacking." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/769153669> ; # Low tech hacking : street smarts for security professionals
    .

<http://worldcat.org/isbn/9781597496650>
    a schema:ProductModel ;
    schema:isbn "1597496650" ;
    schema:isbn "9781597496650" ;
    .

<http://worldcat.org/isbn/9781597496667>
    a schema:ProductModel ;
    schema:isbn "1597496669" ;
    schema:isbn "9781597496667" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.