Related Books
Language: en
Pages: 407
Pages: 407
Type: BOOK - Published: 2014-04-11 - Publisher: Syngress
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows th
Language: en
Pages: 241
Pages: 241
Type: BOOK - Published: 2022-06-14 - Publisher: No Starch Press
A guide to hacking the human element. Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an em
Language: en
Pages: 531
Pages: 531
Type: BOOK - Published: 2014-06-14 - Publisher: No Starch Press
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide
Language: en
Pages: 267
Pages: 267
Type: BOOK - Published: 2017-02-27 - Publisher: John Wiley & Sons
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking f
Language: en
Pages: 375
Pages: 375
Type: BOOK - Published: 2011-08-04 - Publisher: John Wiley & Sons
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugiti