Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
Choose an application
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--
Computer crimes --- Hackers --- Online identities --- Organized crime.
Choose an application
Fruit d'une enquête ethnographique menée dans la région de San Francisco, là où les chantres de la contre-culture libertaire côtoient les entrepreneurs de la Silicon Valley, ce livre plonge au coeur du mouvement faire (make). Il en décrit les origines historiques ainsi que ses multiples impacts sur l'économie et la société. Michel Lallement a partagé la vie des hackers, les a regardés inventer, bidouiller et s'organiser au quotidien dans des communautés frottées, pour certaines d'entre elles, aux principes de l'anarchisme. Il les a fait raconter et expliquer leurs vie, leurs choix, leurs idées. En expérimentant une utopie concrète, les hackers font plus qu'imaginer une autre manière de travailler. C'est une nouvelle grammaire du vivre ensemble que, sous nos yeux, ils sont en train de composer.
Workshops --- Work --- Work ethic --- Hackers --- Do-it-yourself work --- Makerspaces
Choose an application
Become the ethical hacker you need to be to protect your network Key Features Set up, configure, and run a newly installed Kali-Linux 2018.x Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Book Description Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. You will start by learning about the various desktop environments that now come with Kali. The book covers network sniffers and analysis tools to uncover the Windows protocols in use on the network. You will see several tools designed to improve your average in password acquisition, from hash cracking, online attacks, offline attacks, and rainbow tables to social engineering. It also demonstrates several use cases for Kali Linux tools like Social Engineering Toolkit, and Metasploit, to exploit Windows vulnerabilities. Finally, you will learn how to gain full system-level access to your compromised system and then maintain that access. By the end of this book, you will be able to quickly pen test your system and network using easy-to-follow instructions and support images. What you will learn Learn advanced set up techniques for Kali and the Linux operating system Understand footprinting and reconnaissance of networks Discover new advances and improvements to the Kali operating system Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse engineer Windows programs Recover lost files, investigate successful hacks, and discover hidden data Who this book is for If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems, BASH terminal, and Windows command line would be highly beneficial.
Hackers. --- Operating systems (Computers) --- Penetration testing (Computer security) --- Kali Linux.
Choose an application
In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world.
Video games. --- Hackers. --- Technology --- Social aspects. --- Computer hackers --- Computer programmers --- Computer users --- Television games --- Videogames --- Electronic games --- Computer games --- Internet games --- Games --- video games --- hacking --- science fiction
Choose an application
Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.
Computer crimes. --- Hackers. --- Online identities. --- Organized crime. --- cybercrime and the dark net. --- cybercrime books. --- cybercrime investigation. --- cybercrime.
Choose an application
global treaties --- the International Monetary Fund --- the United Nations --- authoritarian world government --- billionnaire elites --- world domination --- control --- the New World Order --- militarizatioon of the police --- financial treason --- climate change --- the Illuminati --- the Freemasons --- the Department of Homeland Security --- population control --- surveillance --- FEMA --- the Freedom of Information Act --- hackers --- ISIS --- Fourth Reich --- the National Security Agency --- suspicious deaths --- end times --- hidden agenda --- conspiracies --- conspiracism --- conspiracy theories --- conspiracy theory --- conspiracy belief --- conspiracy thinking --- disinformation --- Donald Trump --- wikileaks --- UFOs --- list of conspiracies --- controversial literature
Choose an application
This book focuses on the phenomenon of hacktivism and how it has been dealt with up to now in the United States and the United Kingdom. After discussing the birth of the phenomenon and the various relevant groups, from Electronic Disturbance Theater to Anonymous, their philosophies and tactics, this timely and original work attempts to identify the positive and negative aspects hacktivism through an analysis of free speech and civil disobedience theory. Engaging in this process clarifies the dual nature of hacktivism, highlighting its potential for positive contributions to contemporary politics, whilst also demonstrating the risks and harms flowing from its controversial and legally ambiguous nature. Based on this hybrid nature of hacktivism, Karagiannopoulos proceeds to offer a critique of the current responses towards such practices and their potential for preserving the positive elements, whilst mitigating the risks and harms involved in such political practices. Finally, the study focuses on identifying an alternative, symbiotic rationale for responding to hacktivism, based on a cluster of micro-interventions moving away from the conflict-based criminal justice model and the potentially unjust and inefficacious results it entails. .
Hackers. --- Computer networks --- Computer security. --- Security measures. --- Criminal law. --- Police. --- Crime --- Transnational crime. --- Computer crimes. --- Organized crime. --- Criminology and Criminal Justice. --- Cybercrime. --- Organized Crime. --- Transnational Crime. --- Crime and Society. --- Policing. --- Criminal Law. --- Sociological aspects. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer hackers --- Computer programmers --- Computer users --- Protection --- Security measures --- Crime—Sociological aspects. --- Criminal Law and Criminal Procedure Law. --- Crimes and misdemeanors --- Criminals --- Law, Criminal --- Penal codes --- Penal law --- Pleas of the crown --- Public law --- Criminal justice, Administration of --- Criminal procedure --- Cops --- Gendarmes --- Law enforcement officers --- Officers, Law enforcement --- Officers, Police --- Police forces --- Police --- Police officers --- Police service --- Policemen --- Policing --- Criminal justice personnel --- Peace officers --- Public safety --- Multinational crime --- Transborder crime --- Crime syndicates --- Organised crime --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Privacy, Right of --- Law and legislation --- Legal status, laws, etc.
Listing 1 - 8 of 8 |
Sort by
|