skip to content
Hacking the hacker : learn from the experts who take down hackers Preview this item
ClosePreview this item
Checking...

Hacking the hacker : learn from the experts who take down hackers

Author: Roger A Grimes; International Information Systems Security Certification Consortium.
Publisher: Indianapolis, IN : John Wiley & Sons, Inc., [2017] ©2017
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"Day after day, whitehats meet blackhats on the field of cyberspace, battling for control of the technology that powers our world. Ethical hackers--whitehats--are among the most brilliant and resourceful of technology experts, constantly developing new ways to stay one step ahead of those who would hijack our data and systems for personal gain. In these pages, you're going to meet some of the unsung heroes who  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Roger A Grimes; International Information Systems Security Certification Consortium.
ISBN: 9781119396215 1119396212
OCLC Number: 986788432
Notes: "(ISC)²"--Cover.
Description: xxx, 286 pages ; 23 cm
Contents: What type of hacker are you? --
How hackers hack --
Profile: Bruce Schneier --
Social engineering --
Profile: Kevin Mitnick --
Software vulnerabilities --
Profile: Michael Howard --
Profile: Gary McGraw --
Malware --
Profile: Susan Bradley --
Profile: Mark Russinovich --
Cryptography --
Profile: Martin Hellman --
Intrusion detection/APTs --
Profile: Dr. Dorothy E. Denning --
Profile: Michael Dubinsky --
Firewalls --
Profile: William Cheskwick --
Honeypots --
Profile: Lance Spitzner --
Password hacking --
Profile: Dr. Cormac Herley --
Wireless hacking --
Profile: Thomas d'Otreppe de Bouvette --
Penetration testing --
Profile: Aaron Higbee --
Profile: Benild Joseph --
DDoS attacks --
Profile: Brian Krebs --
Secure OS --
Profile: Joanna Rutkowska --
Profile: Aaron Margosis --
Network attacks --
Profile: Laura Chappell --
IoT hacking --
Profile: Dr. Charlie Miller --
Policy and strategy --
Profile: Jing de Jong-Chen --
Threat modeling --
Profile: Adam Shostack --
Computer security education --
Profile: Stephen Northcutt --
Privacy --
Profile: Eva Galperin --
Patching --
Profile: Window Snyder --
Writing as a career --
Profile: Fahmida Y. Rashid --
Guide for parents with young hackers --
Hacker code of ethics.
Responsibility: Roger A. Grimes.

Abstract:

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/986788432> # Hacking the hacker : learn from the experts who take down hackers
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "986788432" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/hackers> ; # Hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computers_security_cryptography> ; # COMPUTERS / Security / Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computer_security> ; # Computer security
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:author <http://experiment.worldcat.org/entity/work/data/4187419310#Person/grimes_roger_a> ; # Roger A. Grimes
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/4187419310#Organization/international_information_systems_security_certification_consortium> ; # International Information Systems Security Certification Consortium.
    schema:datePublished "2017" ;
    schema:description "What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics."@en ;
    schema:description ""Day after day, whitehats meet blackhats on the field of cyberspace, battling for control of the technology that powers our world. Ethical hackers--whitehats--are among the most brilliant and resourceful of technology experts, constantly developing new ways to stay one step ahead of those who would hijack our data and systems for personal gain. In these pages, you're going to meet some of the unsung heroes who protect us all from the Dark Side. You'll discover why they chose this field, the areas in which they excel, and their most notable accomplishments. You'll also get a brief overview of the many different types of cyberattacks they battle. If the world of ethical hacking intrigues you, here's where to start exploring."--Page [4] of cover."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4187419310> ;
    schema:inLanguage "en" ;
    schema:name "Hacking the hacker : learn from the experts who take down hackers"@en ;
    schema:productID "986788432" ;
    schema:workExample <http://worldcat.org/isbn/9781119396215> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/986788432> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4187419310#Organization/international_information_systems_security_certification_consortium> # International Information Systems Security Certification Consortium.
    a schema:Organization ;
    schema:name "International Information Systems Security Certification Consortium." ;
    .

<http://experiment.worldcat.org/entity/work/data/4187419310#Person/grimes_roger_a> # Roger A. Grimes
    a schema:Person ;
    schema:familyName "Grimes" ;
    schema:givenName "Roger A." ;
    schema:name "Roger A. Grimes" ;
    .

<http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computers_security_cryptography> # COMPUTERS / Security / Cryptography
    a schema:Intangible ;
    schema:name "COMPUTERS / Security / Cryptography"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4187419310#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://worldcat.org/isbn/9781119396215>
    a schema:ProductModel ;
    schema:isbn "1119396212" ;
    schema:isbn "9781119396215" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.