Low tech hacking: street smarts for security professionals
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tec...
Gespeichert in:
Weitere beteiligte Personen: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, Mass.
Syngress
2012
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597496650/?ar |
Zusammenfassung: | Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xix, 243 Seiten) illustrations |
ISBN: | 9781597496650 1597496650 9781597496667 1597496669 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648236 | ||
003 | DE-627-1 | ||
005 | 20240228114853.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781597496650 |9 978-1-59749-665-0 | ||
020 | |a 1597496650 |9 1-59749-665-0 | ||
020 | |a 9781597496667 |9 978-1-59749-666-7 | ||
020 | |a 1597496669 |9 1-59749-666-9 | ||
035 | |a (DE-627-1)047648236 | ||
035 | |a (DE-599)KEP047648236 | ||
035 | |a (ORHE)9781597496650 | ||
035 | |a (DE-627-1)047648236 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Low tech hacking |b street smarts for security professionals |c Jack Wiles [and others] |
264 | 1 | |a Waltham, Mass. |b Syngress |c 2012 | |
300 | |a 1 Online-Ressource (xix, 243 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computers and IT | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer security | |
700 | 1 | |a Wiles, Jack |e MitwirkendeR |4 ctb | |
700 | 1 | |a Gudaitis, Terry |e MitwirkendeR |4 ctb | |
700 | 1 | |a Jabbusch, Jennifer |e MitwirkendeR |4 ctb | |
700 | 1 | |a Rogers, Russ |e MitwirkendeR |4 ctb | |
700 | 1 | |a Lowther, Sean |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597496650/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648236 |
---|---|
_version_ | 1821494867368345600 |
adam_text | |
any_adam_object | |
author2 | Wiles, Jack Gudaitis, Terry Jabbusch, Jennifer Rogers, Russ Lowther, Sean |
author2_role | ctb ctb ctb ctb ctb |
author2_variant | j w jw t g tg j j jj r r rr s l sl |
author_facet | Wiles, Jack Gudaitis, Terry Jabbusch, Jennifer Rogers, Russ Lowther, Sean |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648236 (DE-599)KEP047648236 (ORHE)9781597496650 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02316cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-047648236</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114853.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496650</subfield><subfield code="9">978-1-59749-665-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496650</subfield><subfield code="9">1-59749-665-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496667</subfield><subfield code="9">978-1-59749-666-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496669</subfield><subfield code="9">1-59749-666-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648236</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648236</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597496650</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Low tech hacking</subfield><subfield code="b">street smarts for security professionals</subfield><subfield code="c">Jack Wiles [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 243 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gudaitis, Terry</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jabbusch, Jennifer</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowther, Sean</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597496650/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648236 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597496650 1597496650 9781597496667 1597496669 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xix, 243 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Low tech hacking street smarts for security professionals Jack Wiles [and others] Waltham, Mass. Syngress 2012 1 Online-Ressource (xix, 243 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions. Computer security Hackers Computer Security Sécurité informatique Pirates informatiques Computers and IT Wiles, Jack MitwirkendeR ctb Gudaitis, Terry MitwirkendeR ctb Jabbusch, Jennifer MitwirkendeR ctb Rogers, Russ MitwirkendeR ctb Lowther, Sean MitwirkendeR ctb |
spellingShingle | Low tech hacking street smarts for security professionals Computer security Hackers Computer Security Sécurité informatique Pirates informatiques Computers and IT |
title | Low tech hacking street smarts for security professionals |
title_auth | Low tech hacking street smarts for security professionals |
title_exact_search | Low tech hacking street smarts for security professionals |
title_full | Low tech hacking street smarts for security professionals Jack Wiles [and others] |
title_fullStr | Low tech hacking street smarts for security professionals Jack Wiles [and others] |
title_full_unstemmed | Low tech hacking street smarts for security professionals Jack Wiles [and others] |
title_short | Low tech hacking |
title_sort | low tech hacking street smarts for security professionals |
title_sub | street smarts for security professionals |
topic | Computer security Hackers Computer Security Sécurité informatique Pirates informatiques Computers and IT |
topic_facet | Computer security Hackers Computer Security Sécurité informatique Pirates informatiques Computers and IT |
work_keys_str_mv | AT wilesjack lowtechhackingstreetsmartsforsecurityprofessionals AT gudaitisterry lowtechhackingstreetsmartsforsecurityprofessionals AT jabbuschjennifer lowtechhackingstreetsmartsforsecurityprofessionals AT rogersruss lowtechhackingstreetsmartsforsecurityprofessionals AT lowthersean lowtechhackingstreetsmartsforsecurityprofessionals |