Introduction
—Jennifer (Jabbusch) Minella, CISSP
CISO, Infrastructure Security Specialist Carolina Advanced Digital, Inc.
INFORMATION IN THIS CHAPTER:
• Book Overview and Key Learning Points
• Book Audience
• How this Book is Organized

Book overview and key learning points

This book arms any reader with the knowledge of how security measures can often be bypassed in situations ranging from physical security to networked enterprise systems—all with minimal technology savvy on the part of the offender. And, although seven of the eight chapters here detail security evasion methods, the true value of the book is realized in the countermeasures provided for each of the attack scenarios detailed.
In a world of content that capitalizes on vulnerability, risk, ...

Get Low Tech Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.