Chained Exploits demonstrates this modernized hacking conflict technique by minute examples that simulate real-world conflict strategies, make use of today’s many usual conflict tools, as well as concentration upon tangible high-value targets, together with credit label as well as healthcare data. Relentlessly consummate as well as realistic, this book covers a full spectrum of conflict avenues, from wireless networks to earthy entrance as well as amicable engineering.
Writing for security, network, as well as alternative IT professionals, a authors take we by any attack, a single step during a time, as well as afterwards deliver today’s many in effect countermeasures— both technical as well as human. Coverage includes:
Constructing credible brand brand new phishing attacks
Discovering that sites alternative Web users have been visiting
Wreaking massacre upon IT confidence around wireless networks
Disrupting competitors’ Web sites
Performing–and preventing–corporate espionage
Destroying secure files
Gaining entrance to in isolation healthcare records
Attacking a viewers of amicable networking pages
Creating wholly brand brand new exploits
and more
Publisher: Addison-Wesley Professional; 1 book (March 9, 2009)
Language: English
ISBN-10: 032149881X
ISBN-13: 978-0321498816
Rapidshare download
http://rapidshare.com/files/228533735/Chained_Exploits.rar
No comments:
Post a Comment