Hacking : the next generation
- Beijing : O'Reilly, c2009
- xiii, 279 p. : il. ; 24 cm
Intelligence gathering -- Inside-out attacks -- The way it works -- Blended threats -- Cloud insecurity -- Abusing mobile devices -- Infiltrating the phishing underground -- Influencing your victims -- Hacking executives -- Case studies.