Advanced Persistent Threat Hacking

個数:

Advanced Persistent Threat Hacking

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 464 p.
  • 言語 ENG
  • 商品コード 9780071828369
  • DDC分類 005.8

Full Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.

Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike
Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught
Perform in-depth reconnaissance to build a comprehensive understanding of the target
Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence
Use social engineering to compromise a specific system, application, or workstation
Identify and attack wireless networks and wireless client devices
Spearphish with hardware-based Trojan devices
Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Contents

Chapter 1: Introduction
Chapter 2: Empirical Data
Chapter 3: APT Hacker Methodology
Chapter 4: An APT Approach to Reconnaissance
Chapter 5: Reconnaissance - Non Technical Data
Chapter 6: Spear Social Engineering
Chapter 7: Phase III - Remote Targeting
Chapter 8: External/Internal Advanced Persistent Threats
Chapter 9: Physical Infiltration
Chapter 10: APT Software Backdoors

最近チェックした商品