Midlands State University Library
Image from Google Jackets

Low tech hacking : street smarts for security professionals / created by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers and Sean Lowther

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Waltham, Mass. : Syngress, c2012.Description: 243 pages illustrations 23.5 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781597496650
Subject(s): LOC classification:
  • QA76.9.A25 LOW
Contents:
Chapter 1: Social engineering: The ultimate low tech hacking threat, 2 - Low tech vulnerabilities: Physical security, 3 - More about locks and ways to low tech hack them, 4 - Low tech wireless hacking, 5 - Low tech targeting and surveillance: How much could they find out about you?, 6 - Low tech hacking for the penetration tester, 7 - Low tech hacking and the law: Where can you go for help?, 8 - Information security awareness training: Your most valuable countermeasure to employee risk -
Summary: Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Book Main Library Open Shelf QA76.9.A25 LOW (Browse shelf(Opens below)) 150864 Available BK137927
Core Collection Main Library Core Collection QA76.9.A25 LOW (Browse shelf(Opens below)) 150862 Available BK138218
Book Book Main Library Open Shelf QA76.9.A25 LOW (Browse shelf(Opens below)) 150863 Available BK138142

Includes bibliographical references and index.

Chapter 1: Social engineering: The ultimate low tech hacking threat, 2 - Low tech vulnerabilities: Physical security, 3 - More about locks and ways to low tech hack them, 4 - Low tech wireless hacking, 5 - Low tech targeting and surveillance: How much could they find out about you?, 6 - Low tech hacking for the penetration tester, 7 - Low tech hacking and the law: Where can you go for help?, 8 - Information security awareness training: Your most valuable countermeasure to employee risk -

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

There are no comments on this title.

to post a comment.