Описание: Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully explains how to plan for a social engineering test, perform reconnaissance, implement the test, and accurately report the results.
Автор: SIKHAR PATRANABIS; Debdeep Mukhopadhyay Название: Fault Tolerant Architectures for Cryptography and Hardware Security ISBN: 9811013861 ISBN-13(EAN): 9789811013867 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.
Описание: Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in the scientific communities. Advancements such as computational power, storage, networking and infrastructure had aided in making major progress in understanding and solving real-world challenges. <br><br><em>Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing</em> investigates the use of service-oriented computing technologies in addressing supporting infrastructure of the cloud, including new challenges in modelling and simulation. This reference source aims to present researchers, engineers and IT professionals with the tools and methods of service-oriented computer in cloud computing.
Автор: Gavin Watson Название: Social Engineering Penetration Testing, ISBN: 0124201245 ISBN-13(EAN): 9780124201248 Издательство: Elsevier Science Рейтинг: Цена: 6230.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks.
The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru