Region: Worldwide excl. Europe   Change Region
Home   |   About Us   |   Contact Us   |  
spacer

Subject Areas

  • Digital Forensics
  • Hacking and Penetration Testing
  • Certification
  • Information Security and System Administrators
  • Special Interests

Areas of Interest

  • Free e-Booklets
  • Write for Syngress
  • Join our e-news group
  • Syngress Solutions
  • Check out Phishwrap
  • Companion Sites
  • Syngress on LinkedIn
  • Syngress on Facebook
  • Syngress on Twitter

Syngress Certification

Syngress Certification's MCTS/MCITP solutions are no longer available.

Home > Hacking and Penetration Testing > Seven Deadliest Social Network Attacks

spacer

ISBN: 9781597495455
Pages: 192
Trim: 7.5 in x 9.25 in
Publication Date: May 2010

Region: Worldwide excl. Europe - $USD
Change Region »

$ 24.95 USD Buy Now

or buy from
Amazon.com
BN.com

Seven Deadliest Social Network Attacks

By Carl Timm, Richard Perez

Description

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. Social Networking Infrastructure Attacks
  2. Malware Attacks
  3. Phishing Attacks
  4. Evil Twin Attacks
  5. Identity Theft
  6. Cyber Bullying
  7. Physical Threats
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

About the Authors

Carl Timm
CCIE, PMP; Regional Director of Security, Savvis, Inc.

Contents

  • Introduction Chapter 1. Social Networking Infrastructure Attacks Chapter 2. Malware Attacks Chapter 3. Phishing Attacks Chapter 4. Evil Twin Attacks Chapter 5. Identity Theft Chapter 6. Cyber Bullying Chapter 7. Physical Threats


gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.