—Jennifer (Jabbusch) Minella, CISSP
CISO, Infrastructure Security Specialist Carolina Advanced Digital, Inc.
INFORMATION IN THIS CHAPTER:
• Book Overview and Key Learning Points
• How this Book is Organized
Book overview and key learning points
This book arms any reader with the knowledge of how security measures can often be bypassed in situations ranging from physical security to networked enterprise systems—all with minimal technology savvy on the part of the offender. And, although seven of the eight chapters here detail security evasion methods, the true value of the book is realized in the countermeasures provided for each of the attack scenarios detailed.
In a world of content that capitalizes on vulnerability, risk, ...