Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Advanced Persistent Threat Hacking by Tyler Wrightson: Used
US $10.24
ApproximatelyS$ 13.11
Condition:
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Standard Shipping.
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Mon, 18 Aug and Fri, 22 Aug to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:285014773506
Item specifics
- Condition
- Book Title
- Advanced Persistent Threat Hacking
- Publication Date
- 2014-09-16
- ISBN
- 9780071828369
About this product
Product Identifiers
Publisher
Mcgraw-Hill Education
ISBN-10
0071828362
ISBN-13
9780071828369
eBay Product ID (ePID)
168474076
Product Key Features
Number of Pages
464 Pages
Publication Name
Advanced Persistent Threat Hacking : the Art and Science of Hacking Any Organization
Language
English
Subject
Networking / General, Security / General, Security / Networking
Publication Year
2014
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
0.9 in
Item Weight
28.1 Oz
Item Length
9 in
Item Width
7.3 in
Additional Product Features
Intended Audience
Trade
LCCN
2015-288062
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1: Introduction Chapter 2: Empirical Data Chapter 3: APT Hacker Methodology Chapter 4: An APT Approach to Reconnaissance Chapter 5: Reconnaissance - Non Technical Data Chapter 6: Spear Social Engineering Chapter 7: Phase III - Remote Targeting Chapter 8: External/Internal Advanced Persistent Threats Chapter 9: Physical Infiltration Chapter 10: APT Software Backdoors
Synopsis
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality,authenticity, or access to any online entitlements included with the product. Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads
LC Classification Number
QA76.9.A25W765 2015
Item description from the seller
Seller feedback (514,997)
- 3***5 (464)- Feedback left by buyer.Past monthVerified purchaseGreat price
- l***6 (38)- Feedback left by buyer.Past monthVerified purchaseGreat communication. A pleasure to do business with.
- a***a (542)- Feedback left by buyer.Past monthVerified purchaseWell-packaged, arrived soon enough. Thank you!