Hacking: The Next Generation: The Next Generation et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 4 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Hacking - The Next Genera... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par Deal FR
État: D'occasion: Bon
Commentaire: Ce livre a été lu mais il est toujours en bon état. 100% garanti.
Amazon rachète votre
article EUR 8,30 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Hacking - The Next Generation (Anglais) Broché – 29 septembre 2009


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 23,50
EUR 20,67 EUR 17,02

Descriptions du produit

Hacking: The Next Generation The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications and social networking sites. Full description


Vendez cet article - Prix de rachat jusqu'à EUR 8,30
Vendez Hacking - The Next Generation contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 8,30, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit

  • Broché: 296 pages
  • Editeur : O'Reilly; Édition : 1 (29 septembre 2009)
  • Langue : Anglais
  • ISBN-10: 0596154577
  • ISBN-13: 978-0596154578
  • Dimensions du produit: 17,8 x 2 x 23,3 cm
  • Moyenne des commentaires client : 4.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
  • Classement des meilleures ventes d'Amazon: 195.089 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

4.0 étoiles sur 5
5 étoiles
0
4 étoiles
2
3 étoiles
0
2 étoiles
0
1 étoiles
0
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

3 internautes sur 3 ont trouvé ce commentaire utile  Par GZH le 23 janvier 2010
Format: Broché Achat vérifié
Les auteurs sont plutôt connus sur la place. Les chapitres s'enchaînent assez rapidement. Mention spéciale aux chapitre Inside-Out et Blended Attacks ainsi qu'à des personnes qui ont "enfin" donné une définition du cloud en démontrant les risques de deux business model bien différents.

Cependant, les chapitres sur le social engineering sont assez moyens et les techniques employées sont répétitives. Même chose pour les cas concrets.

C'est une bonne source et les attaques sont actuelles contrairement à beaucoup d'autres livres sur le sujet ...
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Par keyboardist le 25 mars 2013
Format: Broché Achat vérifié
Un bon livre en anglais sur les techniques de hacking.
Le livre est clair et bien organisé.
Les chapitres ne sont pas tous homogènes dans leur qualité/intérêt mais les moins bons sont quand même intéressants.
Les techniques employées ne sont pas révolutionnaires, mais elles ont le mérite d'être présentées dans des cas réels et récents.

Un ouvrage que je recommande pour les curieux avec des connaissances dans le domaine.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 20 commentaires
22 internautes sur 22 ont trouvé ce commentaire utile 
birds eye view...with a sufficient level of detail. 7 octobre 2009
Par N. Povoa - Publié sur Amazon.com
Format: Broché
I'm always skeptical about books that propose to cover such a vast spectrum of subjects, the book in question however does a wonderful job at explaining in plain english what is happening behind an attack, it unveils the possible motives and end result, and I personally found it a superb manuscript on what is happening today in the fields of hacking and social engineering.

On a more technical side it covers XSS attacks and blended exploits, again in plain english. Though the authors also throw some code in there to keep the techiest of us entertained, personally I found the inclusion of code somewhat unnecessary. 'Plain english' would suffice especially because I found that this would otherwise be the perfect book to hand to someone less techy who wants to know what is happening out there in the wild and to some extent what they need to look out for if they intend to be security conscious. Could they ignore the code? sure! will they? depends on the individual and his/her aversion to programming. It still keeps its five stars though, I cant fault a book for having too much information. The book also covers phishing attacks, that chapter was a very worth wile read. I hold no interest or curiosity in phishing attacks and after reading it I was surprised on what I had learned.

The chapters on social engineering and information gathering were very interesting as well. The authors made a clear effort to mention current online tools that attackers can use to acquire information on a target (may that be a person or a corporate entity) and go into deeper detail on how such an attack can develop into face to face contact with a target. The way the book is written makes it feel like a story, like one attack unfolds into another and that is really why this book is such good fun to read.

If there's something I can fault in this book its really its life span. You have to get it now for it to matter. In 2 years time all this will be old, stale news and at the speed things change in the IT/IS world its really quite inevitable. Social engineering will always be social engineering but the tools used to gather information will surely change.
23 internautes sur 25 ont trouvé ce commentaire utile 
An excellent book that deals with many new attack vectors you may not have considered... 17 octobre 2009
Par Thomas Duff - Publié sur Amazon.com
Format: Broché
I've read my share of hacking books over the years, and usually most of the books focus on the same topics... pointer overflows, brute force password hacks, etc. But with all the movement towards Web 2.0, the Cloud, and social networks, is it possible that hacking vectors have shifted somewhat into areas we don't normally worry about? After reading Hacking: The Next Generation by Nitesh Dhanjani, Billy Rios, and Brett Hardin, the answer is definitely yes. There's a whole new series of things to worry about, both from a corporate and a personal level.

Contents:
Intelligence Gathering: Peering Through the Windows to Your Organization
Inside-Out Attacks: The Attacker Is the Insider
The Way It Works: There Is No Patch
Blended Threats: When Applications Exploit Each Other
Cloud Insecurity: Sharing the Cloud with Your Enemy
Abusing Mobile Devices: Targeting Your Mobile Workforce
Infiltrating the Phishing Underground: Learning from Online Criminals?
Influencing Your Victims: Do What We Tell You, Please
Hacking Executives: Can Your CEO Spot a Targeted Attack?
Case Studies: Different Perspectives
Chapter 2 Source Code Samples
Cache_Snoop.pl
Index

Yes, the deeply technical hacks still exist, the ones that rely on badly coded software to gain privileges you aren't granted. But in some ways, the hacks are getting easier, or at least more available to those who are not hardcore techheads. Take for instance, blended threats. This is an interesting concepts that shows how interconnected software environments have become. In the example they use, Microsoft had a minor vulnerability in XP and Vista, while Apple had a minor vulnerability in their Safari browser. Both vendors didn't feel that either item was critical. That changed (at least for Microsoft) when someone used the behavior in Safari running on Windows to place a dll file on the Windows desktop. This dll file was then used by IE7 when starting up, overriding the use of the real dll in the proper Window directories. You can imagine how this would lead to "undesirable consequences."

And if that's not enough, imagine the potential of hacks in the Cloud. The authors show how one could hack an administration console to a Cloud provider, allowing someone to modify a number of parameters of a Cloud account. Or... if your attack target runs on the Cloud and is charged based on bandwidth and CPU, imagine what you could do to this target if you were to launch a distributed denial of service attack using the Cloud as the attacking client. The resources are almost limitless, and the target will get hit with charges that escalate at an incredible rate. Not a comforting thought if you've trusted your business to "the Cloud"...

I also noticed that more and more, hacking is not so much about taking over hardware as it is about getting a pipeline to timely information. For instance, more and more people are using shared and public calendars to manage their daily work. It's not uncommon to be able to search and find conference call details that aren't removed from the entry. If you find this info, it's very possible that you can call in to the number, remain on mute, and pick up vital information that can be of value to you or other companies. This type of hack isn't technical in the least. It's just a mix of Google searching and ignorant/non-cautious users.

I'd really recommend Hacking: The Next Generation to my fellow techies. More important than learning new ways to mess with each other's minds, it will expose you to a number of new attack vectors that you may not have considered. And in most cases, simple awareness of those new vectors is enough to allow you to start to defend against them.

Disclosure:
Obtained From: Publisher
Payment: Free
18 internautes sur 19 ont trouvé ce commentaire utile 
Great Book! 12 décembre 2009
Par David Chazin - Publié sur Amazon.com
Format: Broché Achat vérifié
This is a great read if you are interested in understanding what types of things make your systems and identity vulnerable to hacking. I basically read it cover to cover in a single sitting, I could not put it down. This is not a book that tells you how to secure your systems against various threats, but rather explains in detail how threats arise and how they are exploited. If you are a software professional interested in building secure systems or just interested in how to protect yourself online I highly recommend this book.
4 internautes sur 4 ont trouvé ce commentaire utile 
Introductory and probably most suitable to the masses who won't read it because of all the code, jargon and assumed knowledge 19 avril 2011
Par Christian R. Unger - Publié sur Amazon.com
Format: Broché Achat vérifié
This is quite a strange book, because on the one hand it is quite technical in listing sample code, and assuming base knowledge. On the other hand it covers some really basic things in great deal, while glossing over some things with phrases to the effect of "the attacker now has access to the entire organisation's mail", when really, they wouldn't.

So there is a fair bit of fear mongering, but not because they are wrong so much as because they are skipping some steps. That, to me, seems a fatal flaw, because the technical people would say "yeah ... ok, if I assume you are as good as you claim to be", and the non-technical people are thinking this is Harry Potter, because there were some arcane script(ure)s and then stuff went very bad.

I'd say that to most technical people with a slight security focus there is nothing new in here. To the non-technical or non-security people though, who the text (not the code) is (should be) aimed at, various bits will be very off-putting. Especially the code and the jargon.

Also, this title fails to appreciate that successful attacks are not just down to people being in a rush and warning messages not being user friendly. Granted, their analysis of phishers is a great read, but I don't think it will be read by the right people. Technical aware people already know they are mostly muppets, and non-technical people won't get the joke because it is buried in php code.

One saving grace, which sadly is too little (one short chapter) and too late (last chapter), are the two case studies that conclude the book. The two case studies highlight first a very effective but non technical attack, and then rather technical attack which does feature a bit of code, but not terribly so. I guess the prior chapters were needed to lay the foundation, but even then, I fear that non-technical readers would be put of by the technical attack's code. Though in this case the code dumps are much more illustrative and far less technical. Problem is though, most non-technical reads would probably not have made it this far.

In the end, this is a very light read to security/IT aware that reminds one of the basic techniques and a missed opportunity to become aware to the unaware. Who then benefits from this book in its current form? Probably junior IT staff and Security researchers for a good introduction ... to junior IT staff. Non-IT staff are probably better off with Secrets and Lies: Digital Security in a Networked World which is aimed at managers more than anything, technical people probably already know where to look (if not check out Bruce Schneier's free news letter at [...] ).
6 internautes sur 7 ont trouvé ce commentaire utile 
Everything you would expect from the title 26 octobre 2009
Par Wayne M. Gipson - Publié sur Amazon.com
Format: Broché
Hacking The Next Generation

This was a very well written book. The authors did a great job of mixing technical and non-technical attack vectors. I felt the flow of the book was very well done, keeping the reader engaged the entire time. The authors gave enough information on each topic to get you started, but did not inundate you with the minute details that can get overwhelming. In many chapters of the book the authors use scenarios to relate the reader to a topic. This method helped me grasp a few of the concepts that may have otherwise taken a second or third read.

In most of the sections that described technical attack vectors the authors gave links to tools that would help the reader perform that specific attack. Not only is this a great way to help the reader increase their tool set, it allows the reader to put into practice what was just read.

Chapter 2: Inside-Out-Attacks is an example of how every technical topic should be taught. The authors used scenario based writing mixed with technical details that really help the reader grasp the concept. Again, these are not littered with enough technical detail to understand in-depth how these attacks work, but they will give you a general understanding of each topic.

Chapter 7: Infiltrating the Phishing Underground was my favorite in the book. The author did a great job of relating how the underground works, how you get in contact with people, and how the act of phishing transpires. I was amazed to read how templates are shared, how they are put in place, and how the phishing crowd feel about each other.

Chapter 5: Sharing the Cloud with Your Enemy was not really what I expected. I was hoping to hear of some new attack vectors, but didn't seem to get that. It was a great reminder of the risks to companies that use shared resources, and allow other administrators to control those resources, but this all seemed like common knowledge.

Overall this book was great. The content seemed very fresh, and where it was overlap from previous readings the authors seemed to put a new spin on old ideas. If you are looking for a book that will teach you step by step how to hack a website, or steal some credit cards, this book is not for you. This book is a great overview of multiple attack vectors, giving broad overviews of each one.

Wayne Gipson, CISSP, CISA
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?