- Shopping Bag ( 0 items )
From the Publisher
"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations.But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new lifebecause they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Techback into focus."--Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.