Hacking: The Next Generation Hacking: The Next Generation

Hacking: The Next Generation

The Next Generation

Nitesh Dhanjani and Others
    • €32.99
    • €32.99

Publisher Description

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
Learn how "inside out" techniques can poke holes into protected networksUnderstand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate dataRecognize weaknesses in today's powerful cloud infrastructures and how they can be exploitedPrevent attacks against the mobile workforce and their devices containing valuable dataBe aware of attacks via social networking sites to obtain confidential information from executives and their assistantsGet case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

GENRE
Computing & Internet
RELEASED
2009
29 August
LANGUAGE
EN
English
LENGTH
298
Pages
PUBLISHER
O'Reilly Media
PROVIDER INFO
OREILLY MEDIA INC
SIZE
12.3
MB
The Art of Cyberwarfare The Art of Cyberwarfare
2022
Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing
2019
How Cybersecurity Really Works How Cybersecurity Really Works
2021
Advanced Penetration Testing Advanced Penetration Testing
2017
Real-World Bug Hunting Real-World Bug Hunting
2019
Web Penetration Testing with Kali Linux Web Penetration Testing with Kali Linux
2013
Abusing the Internet of Things Abusing the Internet of Things
2015
Network Security Tools Network Security Tools
2005