• Tous les prix incluent la TVA.
Il ne reste plus que 4 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Très bon | Détails
Vendu par Nearfine
État: D'occasion: Très bon
Commentaire: Petites traces d'usage. Livraison prévue entre 2 et 3 semaines.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Hacking - The Next Generation (Anglais) Broché – 29 septembre 2009

Retrouvez toutes nos idées cadeaux Livres dans notre Boutique de Noël
4.0 étoiles sur 5 2 commentaires client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 20,61
EUR 19,11 EUR 15,61
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations

Idées cadeaux Livres Idées cadeaux Livres

click to open popover

Offres spéciales et liens associés


Descriptions du produit

Hacking: The Next Generation The security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications and social networking sites. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Idées cadeaux de Noël
Idées cadeaux pour les enfants, les passionnés de high-tech...et plus encore! Retrouvez notre sélection rien que pour vous.

Détails sur le produit

Commentaires en ligne

4.0 étoiles sur 5
5 étoiles
0
4 étoiles
2
3 étoiles
0
2 étoiles
0
1 étoile
0
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché Achat vérifié
Les auteurs sont plutôt connus sur la place. Les chapitres s'enchaînent assez rapidement. Mention spéciale aux chapitre Inside-Out et Blended Attacks ainsi qu'à des personnes qui ont "enfin" donné une définition du cloud en démontrant les risques de deux business model bien différents.

Cependant, les chapitres sur le social engineering sont assez moyens et les techniques employées sont répétitives. Même chose pour les cas concrets.

C'est une bonne source et les attaques sont actuelles contrairement à beaucoup d'autres livres sur le sujet ...
Remarque sur ce commentaire 3 personnes ont trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Broché Achat vérifié
Un bon livre en anglais sur les techniques de hacking.
Le livre est clair et bien organisé.
Les chapitres ne sont pas tous homogènes dans leur qualité/intérêt mais les moins bons sont quand même intéressants.
Les techniques employées ne sont pas révolutionnaires, mais elles ont le mérite d'être présentées dans des cas réels et récents.

Un ouvrage que je recommande pour les curieux avec des connaissances dans le domaine.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.6 étoiles sur 5 21 commentaires
7 internautes sur 7 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Introductory and probably most suitable to the masses who won't read it because of all the code, jargon and assumed knowledge 19 avril 2011
Par Christian R. Unger - Publié sur Amazon.com
Format: Broché Achat vérifié
This is quite a strange book, because on the one hand it is quite technical in listing sample code, and assuming base knowledge. On the other hand it covers some really basic things in great deal, while glossing over some things with phrases to the effect of "the attacker now has access to the entire organisation's mail", when really, they wouldn't.

So there is a fair bit of fear mongering, but not because they are wrong so much as because they are skipping some steps. That, to me, seems a fatal flaw, because the technical people would say "yeah ... ok, if I assume you are as good as you claim to be", and the non-technical people are thinking this is Harry Potter, because there were some arcane script(ure)s and then stuff went very bad.

I'd say that to most technical people with a slight security focus there is nothing new in here. To the non-technical or non-security people though, who the text (not the code) is (should be) aimed at, various bits will be very off-putting. Especially the code and the jargon.

Also, this title fails to appreciate that successful attacks are not just down to people being in a rush and warning messages not being user friendly. Granted, their analysis of phishers is a great read, but I don't think it will be read by the right people. Technical aware people already know they are mostly muppets, and non-technical people won't get the joke because it is buried in php code.

One saving grace, which sadly is too little (one short chapter) and too late (last chapter), are the two case studies that conclude the book. The two case studies highlight first a very effective but non technical attack, and then rather technical attack which does feature a bit of code, but not terribly so. I guess the prior chapters were needed to lay the foundation, but even then, I fear that non-technical readers would be put of by the technical attack's code. Though in this case the code dumps are much more illustrative and far less technical. Problem is though, most non-technical reads would probably not have made it this far.

In the end, this is a very light read to security/IT aware that reminds one of the basic techniques and a missed opportunity to become aware to the unaware. Who then benefits from this book in its current form? Probably junior IT staff and Security researchers for a good introduction ... to junior IT staff. Non-IT staff are probably better off with Secrets and Lies: Digital Security in a Networked World which is aimed at managers more than anything, technical people probably already know where to look (if not check out Bruce Schneier's free news letter at [...] ).
4.0 étoiles sur 5 A Book That Makes You Think... 21 janvier 2014
Par JonathanG - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Hacking: The Next Generation (Animal Guide) (Kindle Edition) ISBN: 978-0596154578 helps the reader look beyond common hacks prevalent in the past. The aim is very much on new ways to extract data and money from unsuspecting ways using new techniques.

The book has both non-technical and technical details of possible exploits and where appropriate offers code that usable to execute a potential exploit. The book provides good insights into how an attacker may discover information about an organisation, from seemingly innocuous sources and put a picture together about the organisation. The aim here is to use the information to gain the confidence of employees with a view to extracting useful information about the company.

The book challenges the notion that attackers are always external users, and looks at insider attacks and their motives, which are not always money. The book cited a good example of how vengeance was the motive for an attack, and how simple it was for the person to carry the attack out – the victim did not every know.

Mobile work is more common, and the use of mobile devices (phones, laptops, memory sticks) is covered and the book covers the potential they create for data loss is covered.

The book examines the legacy of protocols developed for a different era, and highlights the fact that most organisations do not take active steps to patch and upgrade, and emphasises the problems this may cause.

The most interesting chapter covered blended threats, where an attacker will take advantage of vulnerabilities in one vendor’s software to breach a flaw in another vendor’s software – the book specifically mentioned a breach in Safari that led to a further compromise in Windows. It looks at the challenges software development companies face in dealing with these problems. Where does a company draw the line in testing its software and how much must an operating system company do to ensure that their applications work when working with another application vendor’s products.

The book places a lot of emphasis on the use of social attack methods to gain information, including the use of people networking facilities, exploiting people who are not technically strong (e.g. C rank), but who have decision making authority. The book covers the use of network diagrams by attackers to work out who may have influence over a CEO, for instance. With this information, an attacker may seek to exploit that connection to obtain information about the organisation. Another good example was the abuse of conference call facilities by an external party to learn about their competitors activities and to use that information to undermine the company.

The books final chapter looks at using cross-pollination techniques to exploit vulnerabilities in a number of ways. For instance, an attacker may use vulnerabilities at one source to gain access to another source. As business technology becomes more complex, I think these case studies are very pertinent.

Overall, the book provides good coverage of issues that affect organisations and is worth reading.

The book has 298 pages, 10 chapters and costs US19.27 from Amazon Kindle Store, and is also available to rent.
5.0 étoiles sur 5 Timely, Meaningful, and Useful 24 mai 2010
Par K. Scott Proctor - Publié sur Amazon.com
Format: Broché Achat vérifié
"Hacking: The Next Generation" is a unique and valuable book -- it covers an important topic (hacking) in a meaningful and useful manner and it addresses issues of immediate import. This is not a book that will "date" itself due to its "current affairs" bent -- this publication covers issues and ideas that will remain relevant in the future.

I found this book's coverage of "people" as a security concern on par with "technology" to be on the mark. While technical topics such as blended threats and cloud infrastructure are covered in significant detail, this publication balances detail with the bigger picture and perspective well.

The authors, Nitesh Dhanjani and Billy Rios, provide some interesting and useful case studies to underscore and contextualize their points. Well-written and eye-opening, this is a book for anyone concerned with hacking.

Highly recommended.
4 internautes sur 5 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 A Good Introduction to Today's Top Threats 13 janvier 2010
Par David J. Bianco - Publié sur Amazon.com
Format: Broché Achat vérifié
It's almost cliché to talk about how quickly things change in the IT world. When you're talking about IT security, though, "quickly" is an understatement. Why, then, do many of today's "hacking" books seem like they might have been written in 1999? Attackers have progressed beyond the scan-and-exploit phase; shouldn't your understanding of the threatscape evolve to match?

That is precisely the premise of "Hacking: The Next Generation." In fact, the title is a bit of a misnomer. It's not talking about the next generation of hacking at all; it's talking about the *current* one, albeit a generation of hacking that many security organizations haven't caught up with yet.

I first saw this book in the store, and a quick glance through the Table of Contents got me pretty excited. I saw topics like mobile security, the phishing underground, targeted attacks against company executives and (the big selling point for me) attacks against cloud computing. In fact, I was so excited to read it that I ordered it from Amazon on the spot, through my phone. After having read this book, I can say that it lived up to most of my expectations.

First off, this is a book about high end attackers, professionals who select their targets carefully, do their research and have a clear goal in mind. The authors' focus seems to be primarily organized crime, but they also cover motivated insiders and to a much lesser extent, nation-state actors. Collectively, these types of attackers are known in the trade as "Advanced Persistent Threats", or "APT".

Secondly, I really liked the fact that the book emphasizes what I will call an intelligence-based approach. APT is notorious for doing their homework and uncovering a shocking amount of information about their targets before the attack itself ever even begins. It's appropriate, therefore, that the book begins with a chapter on information gathering via search engines and other public sources. It also has an entire chapter describing how an attacker could use this public information to identify likely targets in an organization and map out their social and professional connections to identify potential weaknesses to exploit via social engineering.

One of the standout chapters was Chapter 5 ("Cloud Insecurity: Sharing the Cloud with Your Enemy"). There are many definitions of "cloud" computing, the this chapter picks two leading examples (Amazon's EC2 and Google's App Engine) and discusses how these services work and several ways an attacker with access to these same public clouds could begin to attack systems deployed there. Even if you have no experience with cloud computing, this chapter provides enough background to allow you to understand and evaluate the risks that the authors bring to light.

There are a few areas for improvement in this book, though, that kept me from being able to assign a full five stars to this review. For a book about the "next" generation of hacking, many parts read like they could have been written 5, 10 or even 15 years ago. Chapter 3 ("The Way it Works: There is no Patch") discusses password sniffing, email spoofing and ARP poisoning, all techniques that are over a decade old. Although they are still seen in the real world, each of them has been covered better elsewhere. This chapter is just a glaring anachronism compared to some of the others, and it detracts from the "Next Generation" focus in a very distracting way.

Chapter 6 ("Abusing Mobile Devices") is also pretty weak. In a "Next Generation" chapter on mobile devices, I expected to see coverage of iPhones, BlackBerries and other popular smart phones. Instead, the authors' chose to focus on laptops and insecure Wi-Fi access. If you really want to know how to spoof an access point to read someone's email in the local Starbucks, I'd suggest buying another book that covers the topic in more detail. As it is, I was very disappointed that the authors chose to waste space on this topic when there are much more modern techniques being used in the real world.

Overall, "Hacking: The Next Generation" is a solid overview of the techniques used by some of today's top threats. It provides a good overview of the kind of intelligence-driven attacks you're likely to see from APT. Although parts of this book seem like they're looking backwards rather than forwards, the rest of the book more than makes up for those flaws.
18 internautes sur 19 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Book! 12 décembre 2009
Par David Chazin - Publié sur Amazon.com
Format: Broché Achat vérifié
This is a great read if you are interested in understanding what types of things make your systems and identity vulnerable to hacking. I basically read it cover to cover in a single sitting, I could not put it down. This is not a book that tells you how to secure your systems against various threats, but rather explains in detail how threats arise and how they are exploited. If you are a software professional interested in building secure systems or just interested in how to protect yourself online I highly recommend this book.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?