Libros importados con hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (in English)
Type
Physical Book
Year
2010
Language
English
Pages
336
Format
Paperback
Dimensions
23.1 x 19.1 x 2.3 cm
Weight
0.70 kg.
ISBN
1597495883
ISBN13
9781597495882

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (in English)

Thomas Wilhelm (Author) · Jason Andress (Author) · Syngress Publishing · Paperback

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (in English) - Wilhelm, Thomas ; Andress, Jason

Physical Book

$ 50.73

$ 84.54

You save: $ 33.82

40% discount
  • Condition: New
Origin: United Kingdom (Import costs included in the price)
It will be shipped from our warehouse between Friday, June 28 and Wednesday, July 10.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques (in English)"

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews