Piwik Image

X

Sign Up




READARA
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Overall Rating

NA

Reviews

NA

Hacking The Hacker: Learn From The Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world's most renowned computer security experts
  • Learn how hackers do what they do no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Wiley

Wiley

No image

Roger A. Grimes

No of Pages
244
Publisher
Wiley
ISBN-13
9781119396215
Awards
None
Book Format
Paperback
Published Date
May 1, 2017

Circles

Not in any circle

Book Journey

Reviews [0]

Likes [0]

Recommends [0]

Bookshelf [0]

Table of Contents

No data Found

About Roger A. Grimes

No data Found

Other Books by Author

other books by authors
Malicious Mobile Code: Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows
Author :
Roger A. Grimes
Publisher :
O'Reilly Media
Published Date :
Aug 24, 2001
No of Pages :
544
Book Format :
Paperback
Category :
Hacking
other books by authors
Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening
Author :
Roger A. Grimes
Publisher :
Wrox
Published Date :
May 1, 2006
No of Pages :
604
Book Format :
Paperback
Category :
Hacking

More Hacking Related Books

other Related books
Android Hacker's Handbook
Android Hacker's Handbook
Author :
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
Publisher :
Wiley
Published Date :
Mar 31, 2014
No of Pages :
576
Book Format :
Paperback
Category :
Hacking
other Related books
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
Author :
Joshua Wright, Johnny Cache
Publisher :
McGraw-Hill Education
Published Date :
Mar 16, 2015
No of Pages :
560
Book Format :
Paperback
Category :
Hacking
other Related books
The Browser Hacker's Handbook
The Browser Hacker's Handbook
Author :
Wade Alcorn, Christian Frichot, Michele Orru
Publisher :
Wiley
Published Date :
Mar 24, 2014
No of Pages :
648
Book Format :
Paperback
Category :
Hacking
other Related books
Hacking Wireless Networks - The ultimate hands-on guide
Hacking Wireless Networks - The ultimate hands-on guide
Author :
Mr Andreas Kolokithas
Publisher :
CreateSpace Independent Publishing Platform
Published Date :
Mar 5, 2015
No of Pages :
428
Book Format :
Paperback
Category :
Hacking
other Related books
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Author :
Gabriella Coleman
Publisher :
Verso
Published Date :
Nov 4, 2014
No of Pages :
464
Book Format :
Hardcover
Category :
Hacking
other Related books
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Author :
Al Sweigart
Publisher :
CreateSpace Independent Publishing Platform
Published Date :
Apr 14, 2013
No of Pages :
436
Book Format :
Paperback
Category :
Hacking
other Related books
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author :
Kevin D. Mitnick, William L. Simon
Publisher :
Wiley
Published Date :
Dec 27, 2005
No of Pages :
288
Book Format :
Paperback
Category :
Hacking
other Related books
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Author :
Justin Seitz
Publisher :
No Starch Press
Published Date :
May 3, 2009
No of Pages :
232
Book Format :
Paperback
Category :
Hacking
other Related books
Professional Penetration Testing, Second Edition: Creating and Learning in a Hacking Lab
Professional Penetration Testing, Second Edition: Creating and Learning in a Hacking Lab
Author :
Thomas Wilhelm
Publisher :
Syngress
Published Date :
Jul 31, 2013
No of Pages :
464
Book Format :
Paperback
Category :
Hacking
other Related books
Computer Forensics For Dummies
Computer Forensics For Dummies
Author :
Linda Volonino, Reynaldo Anzaldua
Publisher :
For Dummies
Published Date :
Oct 13, 2008
No of Pages :
388
Book Format :
Paperback
Category :
Hacking
other Related books
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
Author :
Sherri Davidoff, Jonathan Ham
Publisher :
Prentice Hall
Published Date :
Jun 23, 2012
No of Pages :
576
Book Format :
Hardcover
Category :
Hacking
other Related books
Hacker Techniques, Tools, And Incident Handling (Jones & Bartlett Learning Information Systems Security & Ass)
Hacker Techniques, Tools, And Incident Handling (Jones & Bartlett Learning Information Systems Security & Ass)
Author :
Sean-Philip Oriyano
Publisher :
Jones & Bartlett Learning
Published Date :
Aug 2, 2013
No of Pages :
500
Book Format :
Paperback
Category :
Hacking
other Related books
Exploding the Phone
Exploding the Phone
Author :
Phil Lapsley
Publisher :
Grove Press
Published Date :
Feb 11, 2014
No of Pages :
448
Book Format :
Paperback
Category :
Hacking
other Related books
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Author :
Slava Gomzin
Publisher :
Wiley
Published Date :
Feb 17, 2014
No of Pages :
312
Book Format :
Paperback
Category :
Hacking
other Related books
Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide
Author :
Rafay Baloch
Publisher :
Auerbach Publications
Published Date :
Jul 28, 2014
No of Pages :
531
Book Format :
Paperback
Category :
Hacking
other Related books
Hacker Techniques, Tools, and Incident Response
Hacker Techniques, Tools, and Incident Response
Author :
Sean-Philip Oriyano
Publisher :
Jones & Bartlett Pub
Published Date :
Jul 24, 2014
No of Pages :
417
Book Format :
Paperback
Category :
Hacking
other Related books
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
Author :
Emmanuel Goldstein
Publisher :
Wiley
Published Date :
Jul 28, 2008
No of Pages :
888
Book Format :
Hardcover
Category :
Hacking
other Related books
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Author :
Johnny Long, Jack Wiles
Publisher :
Syngress
Published Date :
Feb 21, 2008
No of Pages :
384
Book Format :
Paperback
Category :
Hacking
other Related books
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition
Author :
Mike Shema
Publisher :
McGraw-Hill Osborne Media
Published Date :
Jan 14, 2014
No of Pages :
624
Book Format :
Paperback
Category :
Hacking
other Related books
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Author :
Ryan C. Barnett
Publisher :
Wiley
Published Date :
Dec 10, 2012
No of Pages :
552
Book Format :
Paperback
Category :
Hacking
+

Editorial Reviews

No Editorial Reviews Available

Community Reviews

No Community Reviews Available

Press Releases

No Press Release found

Testimonials

No Data available

Market Place