Knihobot

Tyler Wrightson

    Advanced Persistent Threat Hacking
    • Chapter 1: Introduction§Chapter 2: Empirical Data§Chapter 3: APT Hacker Methodology§Chapter 4: An APT Approach to Reconnaissance§Chapter 5: Reconnaissance - Non Technical Data§Chapter 6: Spear Social Engineering§Chapter 7: Phase III - Remote Targeting§Chapter 8: External/Internal Advanced Persistent Threats§Chapter 9: Physical Infiltration§Chapter 10: APT Software Backdoors§

      Advanced Persistent Threat Hacking