HSPLS site
Login
My List - 0
Help
Search
My Account
Databases
HI Newspaper
eBooks/Audiobooks
Learning
PC Reservation
Reading Program
Basic
Advanced
Power
History
Search:
Title Browse
Author Browse
Subject Browse
Best Seller Browse
Music Title Browse
Video/DVD Title Browse
Journal/Newspaper Title Browse
Serial Title Browse
Series Browse (includes Bestseller List)
General Keyword
Title Keyword
Author Keyword
Subject Keyword
Name Keyword
Series Keyword
Score Title Browse
Talking Book Title Browse
Awards Note Browse
Bib No.
Barcode
Refine Search
> You're searching:
HAWAII STATE PUBLIC LIBRARY SYSTEM
Item Information
Holdings
Summary
More Content
More by this author
Grimes, Roger A, author.
Subjects
Computer security.
Hackers.
Hacking.
Computer networks -- Security measures.
Browse Catalog
by author:
Grimes, Roger A, author.
by title:
Hacking the hacker :...
MARC Display
Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.
by
Grimes, Roger A, author.
Indianapolis, IN : ISC2 : John Wiley & Sons, c2017.
Subjects
Computer security.
Hackers.
Hacking.
Computer networks -- Security measures.
ISBN:
9781119396215 (paperback) :
1119396212 (paperback)
Description:
xxx, 286 pages ; 23 cm
Contents:
What type of hacker are you? -- How hackers hack -- Profile: Bruce Schneier -- Social engineering -- Profile: Kevin Mitnick -- Software vulnerabilities -- Profile: Michael Howard -- Profile: Gary McGraw -- Malware -- Profile: Susan Bradley -- Profile: Mark Russinovich -- Cryptography -- Profile: Martin Hellman -- Intrusion detection/APTs -- Profile: Dr. Dorothy E. Denning -- Profile: Michael Dubinsky -- Firewalls -- Profile: William Cheskwick -- Honeypots -- Profile: Lance Spitzner -- Password hacking -- Profile: Dr. Cormac Herley -- Wireless hacking -- Profile: Thomas d'Otreppe de Bouvette -- Penetration testing -- Profile: Aaron Higbee -- Profile: Benild Joseph -- DDoS attacks -- Profile: Brian Krebs -- Secure OS -- Profile: Joanna Rutkowska -- Profile: Aaron Margosis -- Network attacks -- Profile: Laura Chappell -- IoT hacking -- Profile: Dr. Charlie Miller -- Policy and strategy -- Profile: Jing de Jong-Chen -- Threat modeling -- Profile: Adam Shostack -- Computer security education -- Profile: Stephen Northcutt -- Privacy -- Profile: Eva Galperin -- Patching -- Profile: Window Snyder -- Writing as a career -- Profile: Fahmida Y. Rashid -- Guide for parents with young hackers -- Hacker code of ethics.
Requests:
0
Summary:
Takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. |c--Publsiher's description.
Copy/Holding information
Location
Collection
Call No.
Status
Due Date
Hawaii State Library
Business, Science & Technology
005.8 Gr
Lost
11/20/2023
Add Copy to MyList
Horizon Information Portal 3.25_9884
© 2001-2013
SirsiDynix
All rights reserved.