Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Buy

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.  Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world's most renowned computer security experts
  • Learn how hackers do what they do—no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

(HTML tags aren't allowed.)

How to Make the Most of a Flying Saucer Experience
How to Make the Most of a Flying Saucer Experience

Finally, a useful book about UFOs! It's Professor Solomon's guide to UFOs - specifically, his comprehensive study of the flying saucer phenomenon. In this scholarly yet entertaining work, the Professor delves into UFO legend and lore particularly that of the contactees of the 1950s.

He also presents a biography of
...

Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
Pocket Guide to Fungal Infection
Pocket Guide to Fungal Infection

The Pocket Guide to Fungal Infection presents, in a convenient and practical format, the major features of fungal infections in humans, providing visual information for each pathogen and the infections they cause.

The second edition has been extensively revised. In each chapter the clinical manifestations and management...


Ethical and Social Issues in the Information Age (Texts in Computer Science)
Ethical and Social Issues in the Information Age (Texts in Computer Science)
As I wrote in my second edition preface, since the publication of the second edition in 2003, there have been tremendous changes in the fields of computer science and information sciences. During this period, we have become more dependent on computer and telecommunication technology than ever before. As we, individually and as nations, become more...
Map-based Mobile Services: Theories, Methods and Implementations
Map-based Mobile Services: Theories, Methods and Implementations

The book is divided into three parts: theory, method and implementation. Starting with a summary of the state-of-the-art in mobile technologies, the first part analyses their impacts on cartography and pinpoints the missing theories concerned with the development of map-based mobile services. A conceptual framework of mobile cartography is then...

Auditing Social Media: A Governance and Risk Guide
Auditing Social Media: A Governance and Risk Guide

As I look back on my career at Microsoft, I feel fortunate to have had a front-row seat to witness an incredible shift in how people and organizations communicate and interact. I started at Microsoft in October 1994—about a year after America Online released AOL 1.0 for Windows. As early adopters of social media,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy