download issue 24 here - Help Net Security
download issue 24 here - Help Net Security
download issue 24 here - Help Net Security
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Authors: Nitesh Dhanjani, Billy Rios and Brett Hardin I Pages: 296 I Publisher: OʼReilly I<br />
We have all been witnessing new kinds of attacks<br />
emerging thanks to new technologies<br />
and ways of using our computers and networks.<br />
The use of social media, an increasingly<br />
mobile workforce, cloud computing -<br />
these are just a few of the latest trends that<br />
increase the possibility of being breached.<br />
This book explains them all and gives you insight<br />
into the techniques and mindset of today's<br />
attackers.<br />
About the authors<br />
Nitesh Dhanjani is a well known information<br />
security researcher and speaker. He is the<br />
author of many books about hacking and<br />
computer security, and is Senior Manager in<br />
the Advisory practice At Ernst and Young.<br />
Billy Rios is a security engineer and used to<br />
be a penetration tester for both VeriSign and<br />
Ernst and Young. He made his living by outsmarting<br />
security teams, bypassing security<br />
measures, and demonstrating the business<br />
risk of security exposures.<br />
Brett Hardin is a <strong>Security</strong> Research Lead with<br />
McAfee. Before that, he was a penetration<br />
tester for Ernst and Young's Advanced <strong>Security</strong><br />
Center assessing web application and intranet<br />
security for Fortune 500 companies.<br />
Inside the book<br />
If t<strong>here</strong> is one adjective that fits all successful<br />
cyber attackers, it's "resourceful". They dig up<br />
information through any means they can find<br />
and use it effectively to reach their goal.<br />
Whether the reason behind the attack is<br />
vengeance, fame, political or plain, old fashion<br />
greed, they always seem to be one step<br />
ahead of the defenders.<br />
But, that is not exactly true - for every attack<br />
that succeeds, t<strong>here</strong> are hundreds or thousands<br />
that fail.<br />
www.insecuremag.com 65