Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Advanced Persistent Threat Hacking by Tyler Wrightson: Used
US $10.24
Condition:
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Standard Shipping.
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Sat, Aug 16 and Thu, Aug 21 to 94104
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Payments:
Special financing available. See terms and apply now- for PayPal Credit, opens in a new window or tab
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:285014773506
Item specifics
- Condition
- Book Title
- Advanced Persistent Threat Hacking
- Publication Date
- 2014-09-16
- ISBN
- 9780071828369
- Subject Area
- Computers
- Publication Name
- Advanced Persistent Threat Hacking : the Art and Science of Hacking Any Organization
- Publisher
- Mcgraw-Hill Education
- Item Length
- 9 in
- Subject
- Networking / General, Security / General, Security / Networking
- Publication Year
- 2014
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Height
- 0.9 in
- Item Weight
- 28.1 Oz
- Item Width
- 7.3 in
- Number of Pages
- 464 Pages
About this product
Product Identifiers
Publisher
Mcgraw-Hill Education
ISBN-10
0071828362
ISBN-13
9780071828369
eBay Product ID (ePID)
168474076
Product Key Features
Number of Pages
464 Pages
Publication Name
Advanced Persistent Threat Hacking : the Art and Science of Hacking Any Organization
Language
English
Subject
Networking / General, Security / General, Security / Networking
Publication Year
2014
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
0.9 in
Item Weight
28.1 Oz
Item Length
9 in
Item Width
7.3 in
Additional Product Features
Intended Audience
Trade
LCCN
2015-288062
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1: Introduction Chapter 2: Empirical Data Chapter 3: APT Hacker Methodology Chapter 4: An APT Approach to Reconnaissance Chapter 5: Reconnaissance - Non Technical Data Chapter 6: Spear Social Engineering Chapter 7: Phase III - Remote Targeting Chapter 8: External/Internal Advanced Persistent Threats Chapter 9: Physical Infiltration Chapter 10: APT Software Backdoors
Synopsis
Preventive strategies for deterring today's most malicious and least understood risks to enterprise security, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality,authenticity, or access to any online entitlements included with the product. Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads
LC Classification Number
QA76.9.A25W765 2015
Item description from the seller
Seller feedback (514,978)
- m***m (2310)- Feedback left by buyer.Past 6 monthsVerified purchaseI’m thrilled with my recent purchase . The website was user-friendly, and the product descriptions were accurate. Customer service was prompt and helpful, answering all my questions. My order arrived quickly, well-packaged, and the product exceeded my expectations in quality. I’m impressed with the attention to detail and the overall experience. I’ll definitely shop here again and highly recommend from this seller to others. Thank you for a fantastic experience!
- a***n (51)- Feedback left by buyer.Past 6 monthsVerified purchaseMistakenly ordered a paperback that I thought was a hardcover, not sellers fault; it was described properly on the listing. Seller still processed a refund the day I went to return the item and let me keep the item anyway. A+++ service. Book arrived quickly in great condition and for a great price. Thank you so much! Amazing seller!
- n***c (96)- Feedback left by buyer.Past 6 monthsVerified purchaseseller was communicative about my shipment, media mail took a while and tracking wasn't updated frequently, but seller communicated to me very quickly on status. the item came new and wrapped as described, though the packaging in it was packed wasn't sturdy and falling apart when it got to me.
More to explore :
- Fiction Books & Anne Tyler Fiction,
- Anne Tyler Fiction Paperbacks Books,
- Anne Tyler Fiction Hardcover Books,
- Advanced Readers Copy In Fiction & Literature Books,
- Anne Tyler Fiction Romance Fiction & Books,
- Anne Tyler Drama Fiction Hardcover Books,
- Anne Tyler Fiction Modern & Contemporary Fiction & Books,
- US Weekly Magazines,
- Anne Tyler Fiction Poetry Fiction & Nonfiction Books in English,
- Anne Tyler Fiction Hardcover Books 1950-1999 Publication Year