Think Like a Hacker: A Sysadmin's Guide to Cybersecurity
HomeStore

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

$3.64

Original: $12.14

-70%
Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

$12.14

$3.64

The Story

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability. To defend against hackers you must first learn to think like a hacker.
ASIN: 0692865217
VSKU: BVV.0692865217.G
Condition: Good
Author/Artist:Zinck, Dr. Shannon|Melone, Michael J.
Binding: Paperback
Note: Any images shown are stock photographs and product may differ from what is shown.
Condition Notes: The item shows wear from consistent use, but it remains in good condition and works perfectly. All pages and cover are intact including the dust cover, if applicable . Spine may show signs of wear. Pages may include limited notes and highlighting. May NOT include discs, access code or other supplemental materials.

Description

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage. Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability. To defend against hackers you must first learn to think like a hacker.
ASIN: 0692865217
VSKU: BVV.0692865217.G
Condition: Good
Author/Artist:Zinck, Dr. Shannon|Melone, Michael J.
Binding: Paperback
Note: Any images shown are stock photographs and product may differ from what is shown.
Condition Notes: The item shows wear from consistent use, but it remains in good condition and works perfectly. All pages and cover are intact including the dust cover, if applicable . Spine may show signs of wear. Pages may include limited notes and highlighting. May NOT include discs, access code or other supplemental materials.