Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.

By: Grimes, Roger A [author.]Contributor(s): International Information Systems Security Certification ConsortiumMaterial type: TextTextPublisher: Indianapolis, IN : John Wiley & Sons, Inc., [2017]Copyright date: ©2017Description: xxx, 286 pages ; 23 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781119396215; 1119396212Subject(s): Computer security | Hackers | Hacking | Cryptography | Computer networks -- Security measures | COMPUTERS / Security / Cryptography | Cryptography | Computer networks -- Security measures | Computer security | Hackers | Hacking | ComputersicherheitDDC classification: 005.8, GRI LOC classification: QA76.9.A25 | G758 2017
Contents:
What type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,GRI (Browse shelf) Available Almirah Fresh No.43, Shelf No.5 MCS38285
Total holds: 0

What type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.