Hacking the next generation

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Ha...

Descripción completa

Detalles Bibliográficos
Autor principal: Dhanjani, Nitesh (-)
Otros Autores: Hardin, Brett, Rios, Billy
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing ; Sebastopol, California : O'Reilly 2009.
Edición:First edition
Colección:Animal Guide
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628429406719
Tabla de Contenidos:
  • Intelligence gathering: peering through the windows to your organization
  • Inside-out attaks: the attacker is the intruder - The way it works: there is no patch
  • Blended threats: when applications exploit each other
  • Closed insecurity: sharing the cloud with your enemy
  • Abusing mobile devices: targeting your mobile workforce
  • Infiltrating the phishing underground: learning from online criminals?
  • Influencing your victims: do what we tell you, please
  • Hacking executives: can your CEO spot a targeted attack
  • Case studies: different perspectives.