Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.
Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master's degrees in both Computer Science and Management.
His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Zoom Books East, Glendale Heights, IL, Etats-Unis
Etat : very_good. Book is in very good condition and may include minimal underlining highlighting. The book can also include "From the library of" labels. May not contain miscellaneous items toys, dvds, etc. . We offer 100% money back guarantee and 24 7 customer service. N° de réf. du vendeur ZEV.1597495883.VG
Quantité disponible : 2 disponible(s)
Vendeur : Greenworld Books, Arlington, TX, Etats-Unis
Etat : very_good. Fast Free Shipping â" Very Good condition book with a firm cover and clean pages. Shows normal use and some light wear or limited notes markings. A solid, nice copy to enjoy. N° de réf. du vendeur GWV.1597495883.VG
Quantité disponible : 1 disponible(s)
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
Paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_382655890
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. N° de réf. du vendeur G1597495883I3N00
Quantité disponible : 1 disponible(s)
Vendeur : GoldBooks, Denver, CO, Etats-Unis
Paperback. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur 84M98_43_1597495883
Quantité disponible : 1 disponible(s)
Vendeur : Roland Antiquariat UG haftungsbeschränkt, Weinheim, Allemagne
Illustrated. 336 p. Unread book. Very good condition. Minimum traces of storage. 9781597495882 Sprache: Englisch Gewicht in Gramm: 703 Softcover: 19.1 x 1.9 x 23.5 cm. N° de réf. du vendeur 219361
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 1st edition. 376 pages. 9.10x7.50x1.00 inches. In Stock. N° de réf. du vendeur __1597495883
Quantité disponible : 2 disponible(s)
Vendeur : Bookbot, Prague, Rébublique tchèque
Softcover. Etat : Fair. Spuren von Feuchtigkeit / Nässe; Leichte Rillen / Abschürfungen / Risse / Knicke; Gebrochener Buchrücken. Focusing on innovative security strategies, the book introduces a unique approach to penetration testing by adopting a "ninja" mindset. Readers will explore unconventional techniques that emphasize stealth, disguise, and espionage to gain faster access to a company's assets. It covers practical methods such as impersonating employees, evading alarm systems, identifying vulnerabilities, and utilizing spyware. By rethinking traditional pen testing methods, the author aims to equip security professionals with creative tools to outsmart potential hackers effectively. N° de réf. du vendeur 959f6e48-2367-4084-8f8b-97b7147b4a36
Quantité disponible : 1 disponible(s)
Vendeur : Brook Bookstore On Demand, Napoli, NA, Italie
Etat : new. Questo è un articolo print on demand. N° de réf. du vendeur 551cb962c0ee5b1de759a9c8f7a67527
Quantité disponible : Plus de 20 disponibles
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. pp. 336 Illus. N° de réf. du vendeur 6586826
Quantité disponible : 3 disponible(s)