Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Buy

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.  Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world's most renowned computer security experts
  • Learn how hackers do what they do—no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

(HTML tags aren't allowed.)

Fuel Cell Systems Explained (Second Edition)
Fuel Cell Systems Explained (Second Edition)

Building on the success of the first edition Fuel Cell Systems Explained presents a balanced introduction to this growing area.

"In summary, an altogether satisfying book that puts within its covers the academic tools necessary for explaining fuel cell systems on a multidisciplinary basis." Power Engineering...

Milton's Angels: The Early-Modern Imagination
Milton's Angels: The Early-Modern Imagination

Milton's Paradise Lost, the most eloquent, most intellectually daring, most learned, and most sublime poem in the English language, is a poem about angels. It is told by and of angels; it relies upon their conflicts, communications, and miscommunications. They are the creatures of Milton's narrative, through which he sets the...

The Pythagorean Theorem: A 4,000-Year History
The Pythagorean Theorem: A 4,000-Year History

By any measure, the Pythagorean theorem is the most famous statement in all of mathematics, one remembered from high school geometry class by even the most math-phobic students. Well over four hundred proofs are known to exist, including ones by a twelve-year-old Einstein, a young blind girl, Leonardo da Vinci, and a future president of the...


The Search for Life Continued: Planets Around Other Stars
The Search for Life Continued: Planets Around Other Stars

Barrie Jones addresses the question "are we alone?", which is one of the most frequently asked questions by scientists and non-scientists alike. In The Search for Life Continued, this question is addressed scientifically, and the author is not afraid to include speculation. Indeed, the author believes beyond reasonable...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

The Radio Station, Eighth Edition: Broadcast, Satellite and Internet
The Radio Station, Eighth Edition: Broadcast, Satellite and Internet

The Radio Station is considered the standard work on radio media. It remains a concise and candid guide to the internal workings of radio stations and the radio industry in all of its various forms. Not only will you begin understand how each job at a radio station is best performed, you will learn how it meshes with those of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy