Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Höfundur Roger A. Grimes

Útgefandi Wiley Professional Development (P&T)

Snið ePub

Print ISBN 9781119396215

Útgáfa 1

Útgáfuár 2017

1.990 kr.

Description

Efnisyfirlit

  • Cover
  • Title Page
  • Foreword
  • Introduction
  • 1 What Type of Hacker Are You?
  • Most Hackers Aren’t Geniuses
  • Defenders Are Hackers Plus
  • Hackers Are Special
  • Hackers Are Persistent
  • Hacker Hats
  • 2 How Hackers Hack
  • The Secret to Hacking
  • Hacking Ethically
  • 3 Profile: Bruce Schneier
  • For More Information on Bruce Schneier
  • 4 Social Engineering
  • Social Engineering Methods
  • Social Engineering Defenses
  • 5 Profile: Kevin Mitnick
  • For More Information on Kevin Mitnick
  • 6 Software Vulnerabilities
  • Number of Software Vulnerabilities
  • Why Are Software Vulnerabilities Still a Big Problem?
  • Defenses Against Software Vulnerabilities
  • Perfect Software Won’t Cure All Ills
  • 7 Profile: Michael Howard
  • For More Information on Michael Howard
  • 8 Profile: Gary McGraw
  • For More Information on Gary McGraw
  • 9 Malware
  • Malware Types
  • Number of Malware Programs
  • Mostly Criminal in Origin
  • Defenses Against Malware
  • 10 Profile: Susan Bradley
  • For More Information on Susan Bradley
  • 11 Profile: Mark Russinovich
  • For More on Mark Russinovich
  • 12 Cryptography
  • What Is Cryptography?
  • Why Can’t Attackers Just Guess All the Possible Keys?
  • Symmetric Versus Asymmetric Keys
  • Popular Cryptography
  • Hashes
  • Cryptographic Uses
  • Cryptographic Attacks
  • 13 Profile: Martin Hellman
  • For More Information on Martin Hellman
  • 14 Intrusion Detection/APTs
  • Traits of a Good Security Event Message
  • Advanced Persistent Threats (APTs)
  • Types of Intrusion Detection
  • Intrusion Detection Tools and Services
  • 15 Profile: Dr. Dorothy E. Denning
  • For More Information on Dr. Dorothy E. Denning
  • 16 Profile: Michael Dubinsky
  • For More Information on Michael Dubinsky
  • 17 Firewalls
  • What Is a Firewall?
  • 18 Profile: William Cheswick
  • For More Information on William Cheswick
  • 19 Honeypots
  • What Is a Honeypot?
  • Interaction
  • Why Use a Honeypot?
  • Catching My Own Russian Spy
  • Honeypot Resources to Explore
  • 20 Profile: Lance Spitzner
  • For More Information on Lance Spitzner
  • 21 Password Hacking
  • Authentication Components
  • Hacking Passwords
  • Password Defenses
  • 22 Profile: Dr. Cormac Herley
  • For More Information on Dr. Cormac Herley
  • 23 Wireless Hacking
  • The Wireless World
  • Types of Wireless Hacking
  • Some Wireless Hacking Tools
  • Wireless Hacking Defenses
  • 24 Profile: Thomas d’Otreppe de Bouvette
  • For More Information on Thomas d’Otreppe de Bouvette
  • 25 Penetration Testing
  • My Penetration Testing Highlights
  • How to Be a Pen Tester
  • 26 Profile: Aaron Higbee
  • For More Information on Aaron Higbee
  • 27 Profile: Benild Joseph
  • For More Information on Benild Joseph
  • 28 DDoS Attacks
  • Types of DDoS Attacks
  • DDoS Tools and Providers
  • DDoS Defenses
  • 29 Profile: Brian Krebs
  • For More Information on Brian Krebs
  • 30 Secure OS
  • How to Secure an Operating System
  • Security Consortiums
  • 31 Profile: Joanna Rutkowska
  • For More Information on Joanna Rutkowska
  • 32 Profile: Aaron Margosis
  • For More Information on Aaron Margosis
  • 33 Network Attacks
  • Types of Network Attacks
  • Network Attack Defenses
  • 34 Profile: Laura Chappell
  • For More Information on Laura Chappell
  • 35 IoT Hacking
  • How Do Hackers Hack IoT?
  • IoT Defenses
  • 36 Profile: Dr. Charlie Miller
  • For More Information on Dr. Charlie Miller
  • 37 Policy and Strategy
  • Standards
  • Policies
  • Procedures
  • Frameworks
  • Regulatory Laws
  • Global Concerns
  • Systems Support
  • 38 Profile: Jing de Jong‐Chen
  • For More Information on Jing de Jong‐Chen
  • 39 Threat Modeling
  • Why Threat Model?
  • Threat Modeling Models
  • Threat Actors
  • 40 Profile: Adam Shostack
  • For More Information on Adam Shostack
  • 41 Computer Security Education
  • Computer Security Training Topics
  • Training Methods
  • 42 Profile: Stephen Northcutt
  • For More Information on Stephen Northcutt
  • 43 Privacy
  • Privacy Organizations
  • Privacy‐Protecting Applications
  • 44 Profile: Eva Galperin
  • For More Information on Eva Galperin
  • 45 Patching
  • Patching Facts
  • Common Patching Problems
  • 46 Profile: Window Snyder
  • For More Information on Window Snyder
  • 47 Writing as a Career
  • Computer Security Writing Outlets
  • Professional Writing Tips
  • 48 Profile: Fahmida Y. Rashid
  • For More Information on Fahmida Y. Rashid
  • 49 Guide for Parents with Young Hackers
  • Signs Your Kid Is Hacking
  • Not All Hacking Is Bad
  • How to Turn Around Your Malicious Hacker
  • 50 Hacker Code of Ethics
  • Hacker Code of Ethics
  • End User License Agreement
Show More

Additional information

Veldu vöru

Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “Hacking the Hacker: Learn From the Experts Who Take Down Hackers”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð