Vantaggi dell'abbonamento Vantaggi dell'abbonamento
  • Accedi ad un universo di contenuti audio, senza limiti d'ascolto.
  • Ascolta dove vuoi, quando vuoi, anche offline.
  • Dopo i primi 30 giorni gratis l’iscrizione si rinnova automaticamente a EUR 9,99 al mese.
  • Cancella la tua iscrizione in ogni momento.

Sintesi dell'editore

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.

Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and back doors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.

To defend against hackers, you must first learn to think like a hacker.

©2017 Michael J. Melone (P)2018 Michael J. Melone

Cosa ne pensano gli iscritti

Non ci sono recensioni disponibili
Ordina per:
  • Totali
    5 out of 5 stars
  • Interpretazione
    5 out of 5 stars
  • Storia
    5 out of 5 stars
  • Amazon Customer
  • 03 04 2018

A strategic analysis on the digital age...

Cyber warfare is the new threat in a geopolitical environment of uncertainty... this book explains the concepts and mechanism of how and what hackers can do in cyber space.

1 su 1 utenti hanno ritenuto utile questa recensione