• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Social Engineering in IT Security: Tools, Tactics, and Techniques

    Social Engineering in IT Security: Tools, Tactics, and Techniques by Conheady, Sharon;

    Sorozatcím: NETWORKING & COMM - OMG;

      • 10% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 43.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        19 861 Ft (18 915 Ft + 5% áfa)
      • Kedvezmény(ek) 10% (cc. 1 986 Ft off)
      • Kedvezményes ár 17 875 Ft (17 024 Ft + 5% áfa)

    19 861 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadó McGraw Hill
    • Megjelenés dátuma 2014. szeptember 16.

    • ISBN 9780071818469
    • Kötéstípus Puhakötés
    • Terjedelem272 oldal
    • Méret 231x190x14 mm
    • Súly 451 g
    • Nyelv angol
    • 0

    Kategóriák

    Hosszú leírás:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Cutting-edge social engineering testing techniques

    "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

    Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

    • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
    • Understand the legal and ethical aspects of performing a social engineering test
    • Find out why social engineering works from a victim's point of view
    • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
    • Gather information through research and reconnaissance
    • Create a credible social engineering scenario
    • Execute both on-site and remote social engineering tests
    • Write an effective social engineering report
    • Learn about various tools, including software, hardware, and on-site tools
    • Defend your organization against social engineering attacks



    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


    Cutting-edge social engineering testing techniques

    "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

    Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

    • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
    • Understand the legal and ethical aspects of performing a social engineering test
    • Find out why social engineering works from a victim's point of view
    • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
    • Gather information through research and reconnaissance
    • Create a credible social engineering scenario
    • Execute both on-site and remote social engineering tests
    • Write an effective social engineering report
    • Learn about various tools, including software, hardware, and on-site tools
    • Defend your organization against social engineering attacks

    Több

    Tartalomjegyzék:

    1. Social Engineering's Evolution
    2. The Ethical and Legal Aspects of Social Engineering
    3. Practical Social Engineering and Why it Works
    4. Planning Your Social Engineering Test
    5. Reconnaissance & Information Gathering
    6. Scenario Creation & Testing
    7. Executing Your Social Engineering Test
    8. Reporting
    9. The Social Engineering Arsenal & Tools of the Trade
    10. Defense Against Social Engineering Attacks
    11. Tomorrow's Social Engineering Attacks

    Több
    0