Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.
Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master's degrees in both Computer Science and Management.
His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Gratuit expédition vers Etats-Unis
Destinations, frais et délaisEUR 3,53 expédition vers Etats-Unis
Destinations, frais et délaisVendeur : ZBK Books, Carlstadt, NJ, Etats-Unis
Etat : acceptable. Used book - May contain writing, notes, highlighting, bends or folds. Text is readable, book is clean, and pages and cover mostly intact. May show normal wear and tear. Item may be missing CD. May include library marks. Fast Shipping. N° de réf. du vendeur ZWM.NV6M
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.65. N° de réf. du vendeur G1597495883I4N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Dallas, Dallas, TX, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.65. N° de réf. du vendeur G1597495883I3N00
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.65. N° de réf. du vendeur G1597495883I3N00
Quantité disponible : 1 disponible(s)
Vendeur : AwesomeBooks, Wallingford, Royaume-Uni
Paperback. Etat : Very Good. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . N° de réf. du vendeur 7719-9781597495882
Quantité disponible : 1 disponible(s)
Vendeur : Bahamut Media, Reading, Royaume-Uni
Paperback. Etat : Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. N° de réf. du vendeur 6545-9781597495882
Quantité disponible : 1 disponible(s)
Vendeur : HPB-Red, Dallas, TX, Etats-Unis
Paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_392496829
Quantité disponible : 1 disponible(s)
Vendeur : Roland Antiquariat UG haftungsbeschränkt, Weinheim, Allemagne
Illustrated. 336 p. Unread book. Very good condition. Minimum traces of storage. 9781597495882 Sprache: Englisch Gewicht in Gramm: 703 Softcover: 19.1 x 1.9 x 23.5 cm. N° de réf. du vendeur 219361
Quantité disponible : 1 disponible(s)
Vendeur : Shakespeare Book House, Rockford, IL, Etats-Unis
Etat : New. The item is Brand New! N° de réf. du vendeur 570TQW000O75_ns
Quantité disponible : 1 disponible(s)
Vendeur : Toscana Books, AUSTIN, TX, Etats-Unis
Paperback. Etat : new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. N° de réf. du vendeur Scanned1597495883
Quantité disponible : 1 disponible(s)