Seven Deadliest USB Attacks Seven Deadliest USB Attacks

Seven Deadliest USB Attacks

    • $26.99
    • $26.99

Publisher Description

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and exploits effecting USB technology, then this book is for you. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency.

The book provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. There are seven chapters that cover the following: USB Hacksaw; the USB Switchblade; viruses and malicious codes; USB-based heap overflow; the evolution of forensics in computer security; pod slurping; and the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements.

This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It will be a valuable resource for information security professionals of all levels, as well as web application developers and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

GENRE
Business & Personal Finance
RELEASED
2010
June 3
LANGUAGE
EN
English
LENGTH
256
Pages
PUBLISHER
Elsevier Science
SELLER
Elsevier Ltd.
SIZE
6.8
MB

More Books Like This

Penetration Testing Fundamentals Penetration Testing Fundamentals
2018
Cybersecurity Cybersecurity
2013
Network Defense and Countermeasures Network Defense and Countermeasures
2018
GCIH GIAC Certified Incident Handler All-in-One Exam Guide GCIH GIAC Certified Incident Handler All-in-One Exam Guide
2020
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)
2018
Advanced Penetration Testing Advanced Penetration Testing
2017

More Books by Brian Anderson & Barbara Anderson

Titanic Joke Book Titanic Joke Book
2011
The Conjurers #1: Rise of the Shadow The Conjurers #1: Rise of the Shadow
2020
The Ultimate Credit Score Guide and Debt Reduction Value Pack - How to Get Out of Debt + The Credit Score Blueprint - The #1 Beginners Box Set for Improving Your Finances The Ultimate Credit Score Guide and Debt Reduction Value Pack - How to Get Out of Debt + The Credit Score Blueprint - The #1 Beginners Box Set for Improving Your Finances
2020
Walk & Eat Kefalonia Walk & Eat Kefalonia
2011
Fathering Together Fathering Together
2022
The Credit Score Blueprint: Strategies and Secrets to Raising Your Credit Score The Credit Score Blueprint: Strategies and Secrets to Raising Your Credit Score
2020