 |


|
 |
Item Details
Title:
|
HACKING: THE NEXT GENERATION
|
By: |
Nitesh Dhanjani, Billy Rios, Brett Hardin |
Format: |
Paperback |

List price:
|
£31.99 |
Our price: |
£30.39 |
Discount: |
|
You save:
|
£1.60 |
|
|
|
|
ISBN 10: |
0596154577 |
ISBN 13: |
9780596154578 |
Availability: |
Usually dispatched within 3-5 days.
Delivery
rates
|
Stock: |
Currently 1item in stock |
Publisher: |
O'REILLY MEDIA, INC, USA |
Pub. date: |
1 September, 2009 |
Pages: |
298 |
Description: |
The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications and social networking sites. |
Synopsis: |
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations |
Illustrations: |
1, black & white illustrations |
Publication: |
US |
Imprint: |
O'Reilly Media, Inc, USA |
Returns: |
Returnable |
|
|
|
 |


|

|

|

|

|
No Cheese, Please!
A fun picture book for children with food allergies - full of friendship and super-cute characters!Little Mo the mouse is having a birthday party.

|
My Brother Is a Superhero
Luke is massively annoyed about this, but when Zack is kidnapped by his arch-nemesis, Luke and his friends have only five days to find him and save the world...

|

|

|
|
 |