Cantitate/Preț
Produs

Stickley, J: Corporate Insecurity

Autor Jim Stickley
en Limba Engleză Paperback – 29 feb 2020
Subtitled,"TrueStoriesOfCorporateEspionage&NetworkInfiltration".
Citește tot Restrânge

Preț: 13698 lei

Nou

Puncte Express: 205

Preț estimativ în valută:
2622 2697$ 2175£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780789739872
ISBN-10: 0789739879
Pagini: 320
Dimensiuni: 178 x 232 mm
Ediția:1
Editura: Pearson Education (US)
Locul publicării:Indianapolis, United States

Notă biografică

JimStickley,CTOandVPofEngineeringforTraceSecurity,isaninternationallyrenownedsecurityexpert.HedirectsTraceSecurity'scompanystrategy.StickleyhasbeenshowcasedonNBCNightlyNews,CNNNewsNight,CNBC'sandNBC'sTodayShow,andquotedinTime,BusinessWeek,Fortune,andTheNewYorkTimesamongstothers.HeisauthorofTheTruthAboutIdentityTheft.


Descriere

A shocking tell-all look at corporate security, from a white-hat hacker who's spent years breaking into banks, insurers, and hospitals! If you assume that the businesses you deal with are looking after your data securely, you're in for a shock. Companies are only as secure as their weakest link - this book shows just how weak this link can be. Corporate Insecurity details frightening tales of corporate espionage that have never been told before.

It includes from-the-trenches advice on making safe security holes: from technical issues to training, physical layouts to security mindsets. Written by Jim Stickley, one of the world's most well-known experts on corporate security and identity theft.


Cuprins

PartI:BreakinginWhileTheyWatch
1.TheFireInspectoratabank
2.TheRussianDiplomatatagovernmentfacility
3.ThePestInspectoratacreditunion
4.TheAirConditioningTechnicianattheLottery
5.TheCubeConsultantatamortgagecompany
6.TheReporterwithCameraManatalawoffice
7.TheOSHAInspectoratabank
8.TheHiredConsultant(Whenasmallamountofaccessturnedintoalargeamount)
9.Whenjobsgowrong.(Walkthroughthestorywhereanengineerwasarrestedwhileperformingtheattack)
PartII:GainingConfidentialInformationWhileHiddenintheShadows
10.TheHallmarkGreetingcardandother"friendlyemail"attacks
11.TheFreeKeyboard.Whenfreecomeswithaseriousprice
12.Usingcorporateemailtogainconfidentialinformation
13.TheBillboardtakeover(Howwetookoveranelectronicbillboardsystemgivingaccesstopostourowninformationonboardsthroughouttheworld.)
14.HotelbusinesscentersandconferenceInternetcafés,thehackershomeawayfromhome
15.Wirelessaccesspointsandtheunseenrisks(Thischapterwillcovernotonlytherisksfoundinhotelsbutalsowhenemployeesusewirelesstobypassinternalcorporatesecurity)
16.Socialnetworkingandthemanyrisks
17.WhenATM'sbecomeAutomatedThievingMachines
18.UsingmusicCD'stoaccesspersonalcomputers
19.Phishing,VishingandSmishing,understandinghowtheseattacksworkfrominsideout