Hacking the Hacker: Learn From the Experts Who Take Down Hackers Front Cover

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

  • Length: 320 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2017-05-01
  • ISBN-10: 1119396212
  • ISBN-13: 9781119396215
  • Sales Rank: #127862 (See Top 100 Books)
Description

Meet the world’s top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world’s top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.  Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world’s most renowned computer security experts
  • Learn how hackers do what they do—no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Table of Contents

Chapter 1 What Type Of Hacker Are You?
Chapter 2 How Hackers Hack
Chapter 3 Profile: Bruce Schneier
Chapter 4 Social Engineering
Chapter 5 Profile: Kevin Mitnick
Chapter 6 Software Vulnerabilities
Chapter 7 Profile: Michael Howard
Chapter 8 Profile: Gary Mcgraw
Chapter 9 Malware
Chapter 10 Profile: Susan Bradley
Chapter 11 Profile: Mark Russinovich
Chapter 12 Cryptography
Chapter 13 Profile: Martin Hellman
Chapter 14 Intrusion Detection/Apts
Chapter 15 Profile: Dr
Chapter 16 Profile: Michael Dubinsky
Chapter 17 Firewalls
Chapter 18 Profile: William Cheswick
Chapter 19 Honeypots
Chapter 20 Profile: Lance Spitzner111
Chapter 21 Password Hacking115
Chapter 22 Profile: Dr
Chapter 23 Wireless Hacking
Chapter 24 Profile: Thomas D’Otreppe De Bouvette133
Chapter 25 Penetration Testing137
Chapter 26 Profile: Aaron Higbee147
Chapter 27 Profile: Benild Joseph
Chapter 28 Ddos Attacks
Chapter 29 Profile: Brian Krebs
Chapter 30 Secure Os
Chapter 31 Profile: Joanna Rutkowska
Chapter 32 Profile: Aaron Margosis175
Chapter 33 Network Attacks
Chapter 34 Profile: Laura Chappell
Chapter 35 Iot Hacking
Chapter 36 Profile: Dr
Chapter 37 Policy And Strategy
Chapter 38 Profile: Jing De Jong-Chen
Chapter 39 Threat Modeling
Chapter 40 Profile: Adam Shostack
Chapter 41 Computer Security Education
Chapter 42 Profile: Stephen Northcutt
Chapter 43 Privacy
Chapter 44 Profile: Eva Galperin
Chapter 45 Patching
Chapter 46 Profile: Window Snyder
Chapter 47 Writing As A Career
Chapter 48 Profile: Fahmida Y
Chapter 49 Guide For Parents With Young Hackers
Chapter 50 Hacker Code Of Ethics

To access the link, solve the captcha.