+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Hacking the Hacker. Learn From the Experts Who Take Down Hackers

  • ID: 4070646
  • Book
  • 320 Pages
  • John Wiley and Sons Ltd
1 of 3

MEET THE ROCK STARS OF CYBERSECURITY

Day after day, whitehats meet blackhats on the field of cyberspace, battling for control of the technology that powers our world. Ethical hackers whitehats are among the most brilliant and resourceful of technology experts, constantly developing new ways to stay one step ahead of those who would hijack our data and systems for personal gain.

In these pages, you′re going to meet some of the unsung heroes who protect us all from the Dark Side. You′ll discover why they chose this field, the areas in which they excel, and their most notable accomplishments. You′ll also get a brief overview of the many different types of cyberattacks they battle.

If the world of ethical hacking intrigues you, here′s where to start exploring. You′ll hear from:

  • Bruce Schneier, America′s leading cyber–security expert
  • Kevin Mitnick, master of social engineering
  • Dr. Dorothy E. Denning, specialist in intrusion detection
  • Mark Russinovich, Azure Cloud CTO
  • Dr. Charlie Miller, leader in thwarting car hacks

and many more

Note: Product cover images may vary from those shown
2 of 3

Foreword xxxi

Introduction xxxiii

1 What Type of Hacker Are You? 1

2 How Hackers Hack 9

3 Profile: Bruce Schneier 23

4 Social Engineering 27

5 Profile: Kevin Mitnick 33

6 Software Vulnerabilities 39

7 Profile: Michael Howard 45

8 Profile: Gary McGraw 51

9 Malware 55

10 Profile: Susan Bradley 61

11 Profile: Mark Russinovich 65

12 Cryptography 69

13 Profile: Martin Hellman 75

14 Intrusion Detection/APTs 81

15 Profile: Dr. Dorothy E. Denning 87

16 Profile: Michael Dubinsky 91

17 Firewalls 95

18 Profile: William Cheswick 101

19 Honeypots 107

20 Profile: Lance Spitzner 111

21 Password Hacking 115

22 Profile: Dr. Cormac Herley 123

23 Wireless Hacking 127

24 Profile: Thomas d Otreppe de Bouvette 133

25 Penetration Testing 137

26 Profile: Aaron Higbee 147

27 Profile: Benild Joseph 151

28 DDoS Attacks 155

29 Profile: Brian Krebs 161

30 Secure OS 165

31 Profile: Joanna Rutkowska 171

32 Profile: Aaron Margosis 175

33 Network Attacks 181

34 Profile: Laura Chappell 185

35 IoT Hacking 189

36 Profile: Dr. Charlie Miller 193

37 Policy and Strategy 201

38 Profile: Jing de Jong–Chen 205

39 Threat Modeling 211

40 Profile: Adam Shostack 217

41 Computer Security Education 221

42 Profile: Stephen Northcutt 227

43 Privacy 231

44 Profile: Eva Galperin 235

45 Patching 239

46 Profile: Window Snyder 245

47 Writing as a Career 249

48 Profile: Fahmida Y. Rashid 259

49 Guide for Parents with Young Hackers 263

50 Hacker Code of Ethics 271

Index 275

Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Roger A. Grimes
Note: Product cover images may vary from those shown
Adroll
adroll