영문목차
Table of Contents
Preface ix
1 Intelligence Gathering: Peering Through the Windows to Your Organization 1
2 Inside-Out Attacks: The Attacker Is the Insider 27
3 The Way It Works: There Is No Patch 71
4 Blended Threats: When Applications Exploit Each Other 91
5 Cloud Insecurity: Sharing the Cloud with Your Enemy 121
6 Abusing Mobile Devices: Targeting Your Mobile Workforce 149
7 Infiltrating the Phishing Underground: Learning from Online Criminals? 177
8 Influencing Your Victims: Do What We Tell You, Please 201
9 Hacking Executives: Can Your CEO Spot a Targeted Attack? 223
10 Case Studies: Different Perspectives 241
A Chapter 2 Source Code Samples 255
B Cache_Snoop.pl 265
Index 269