Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Buy
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.

As you browse this book, you'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?

About the Author

Johnny Long is a professional hacker and security researcher for Computer Sciences Corporation. Johnny has written or contributed to several books, including Google Hacking for Penetration Tester from Syngress Publishing, which has secured rave reviews. Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.
(HTML tags aren't allowed.)

Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)

12 The average human body has in the order of 10 circulating platelets. They are crucial for hemostasis, and yet excessive platelet activation is a major cause of m- bidity and mortality in western societies. It is therefore not surprising that platelets have become one of the most extensively investigated biological cell types. We are,...

Advanced Control Engineering
Advanced Control Engineering

Advanced Control Engineering provides a complete course in control engineering for undergraduates of all technical disciplines. Starting with a basic overview of elementary control theory this text quickly moves on to a rigorous examination of more advanced and cutting edge date aspects such as robust and intelligent control, including neural...

Tomcat: The Definitive Guide
Tomcat: The Definitive Guide
It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container and high performance web server. Tomcat: The Definitive Guide is a valuable reference for administrators and webmasters, a useful guide for programmers who want to use Tomcat as their web application server during...

The Xbox 360 Uncloaked:: The Real Story Behind Microsoft's Next-Generation Video Game Console
The Xbox 360 Uncloaked:: The Real Story Behind Microsoft's Next-Generation Video Game Console
A fascinating insider's look at the evolution of the Xbox 360 and Microsoft's ambitious gamble to become a leading force in the multi-billion dollar video game industry. Through extensive interviews and unprecedented access, San Jose Mercury News Technology and Gaming Writer Dean Takahashi takes you behind the scenes as he reveals... The birth of...
The Agile Enterprise: Building and Running Agile Organizations
The Agile Enterprise: Building and Running Agile Organizations

Discover how to implement and operate in an Agile manner at every level of your enterprise and at every point from idea to delivery. Learn how Agile-mature organizations adapt nimbly to microchanges in market conditions. Learn cutting-edge practices and concepts as you extend your implementation of Agile through the entire enterprise to meet...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy