With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
Chapter 1 Intelligence Gathering: Peering Through the Windows to Your Organization
Chapter 2 Inside-Out Attacks: The Attacker Is the Insider
Chapter 3 The Way It Works: There Is No Patch
Chapter 4 Blended Threats: When Applications Exploit Each Other
Chapter 5 Cloud Insecurity: Sharing the Cloud with Your Enemy
Chapter 6 Abusing Mobile Devices: Targeting Your Mobile Workforce
Chapter 7 Infiltrating the Phishing Underground: Learning from Online Criminals?
Chapter 8 Influencing Your Victims: Do What We Tell You, Please
Chapter 9 Hacking Executives: Can Your CEO Spot a Targeted Attack?
Chapter 10 Case Studies: Different Perspectives
Appendix Chapter 2 Source Code Samples