Hacking 在线电子书 图书标签: Hacking 计算机 安全 security O'Reilly 黑客 黑客技术 软件
发表于2024-11-05
Hacking 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024
在回家的路上读了第一章,说到attacker到要攻击的目标所在地实地“踩点”,比如去偷听员工讲话、套磁等等,以获取有用的信息,有点意思
评分在回家的路上读了第一章,说到attacker到要攻击的目标所在地实地“踩点”,比如去偷听员工讲话、套磁等等,以获取有用的信息,有点意思
评分在回家的路上读了第一章,说到attacker到要攻击的目标所在地实地“踩点”,比如去偷听员工讲话、套磁等等,以获取有用的信息,有点意思
评分在回家的路上读了第一章,说到attacker到要攻击的目标所在地实地“踩点”,比如去偷听员工讲话、套磁等等,以获取有用的信息,有点意思
评分把管理员绑了严刑逼出权限
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned information security professionals, this book helps you understand the motives and psychology of hackers behind the new wave of attacks, which enables you to better prepare and defend against them.
* Learn how "inside out" attack techniques can poke holes into protected networks
* Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
* Read about weaknesses in today's powerful cloud infrastructures and how they can be exploited
* Prevent attacks against the mobile workforce and their devices that contain valuable data
* Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
* Learn from case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
评分
评分
评分
评分
Hacking 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024