Hacking the next generation
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Ha...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Beijing ; Sebastopol, California :
O'Reilly
2009.
|
Edición: | First edition |
Colección: | Animal Guide
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628429406719 |
Tabla de Contenidos:
- Intelligence gathering: peering through the windows to your organization
- Inside-out attaks: the attacker is the intruder - The way it works: there is no patch
- Blended threats: when applications exploit each other
- Closed insecurity: sharing the cloud with your enemy
- Abusing mobile devices: targeting your mobile workforce
- Infiltrating the phishing underground: learning from online criminals?
- Influencing your victims: do what we tell you, please
- Hacking executives: can your CEO spot a targeted attack
- Case studies: different perspectives.