×







We sell 100% Genuine & New Books only!

Ninja Hacking Unconventional Penetration Testing Tactics And Techniques at Meripustak

Ninja Hacking Unconventional Penetration Testing Tactics And Techniques by Jason Andress and Thomas Wilhelm , ELSEVIER

Books from same Author: Jason Andress and Thomas Wilhelm

Books from same Publisher: ELSEVIER

Related Category: Author List / Publisher List


  • Price: ₹ 4311.00/- [ 27.01% off ]

    Seller Price: ₹ 3147.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Jason Andress and Thomas Wilhelm
    PublisherELSEVIER
    ISBN9781597495882
    Pages336
    BindingSoftbound
    LanguageEnglish
    Publish YearFebruary 2011

    Description

    ELSEVIER Ninja Hacking Unconventional Penetration Testing Tactics And Techniques by Jason Andress and Thomas Wilhelm

    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gat.



    Book Successfully Added To Your Cart