HackingtheHacker_LearnFromtheExpertsWhoT.epub - (EPUB全文下载)

文件大小:0.38 mb。
文件格式:epub 格式。
书籍内容:

Table of Contents
Cover
Title Page
Foreword
Introduction
1 What Type of Hacker Are You?
Most Hackers Aren’t Geniuses
Defenders Are Hackers Plus
Hackers Are Special
Hackers Are Persistent
Hacker Hats
2 How Hackers Hack
The Secret to Hacking
Hacking Ethically
3 Profile: Bruce Schneier
For More Information on Bruce Schneier
4 Social Engineering
Social Engineering Methods
Social Engineering Defenses
5 Profile: Kevin Mitnick
For More Information on Kevin Mitnick
6 Software Vulnerabilities
Number of Software Vulnerabilities
Why Are Software Vulnerabilities Still a Big Problem?
Defenses Against Software Vulnerabilities
Perfect Software Won’t Cure All Ills
7 Profile: Michael Howard
For More Information on Michael Howard
8 Profile: Gary McGraw
For More Information on Gary McGraw
9 Malware
Malware Types
Number of Malware Programs
Mostly Criminal in Origin
Defenses Against Malware
10 Profile: Susan Bradley
For More Information on Susan Bradley
11 Profile: Mark Russinovich
For More on Mark Russinovich
12 Cryptography
What Is Cryptography?
Why Can’t Attackers Just Guess All the Possible Keys?
Symmetric Versus Asymmetric Keys
Popular Cryptography
Hashes
Cryptographic Uses
Cryptographic Attacks
13 Profile: Martin Hellman
For More Information on Martin Hellman
14 Intrusion Detection/APTs
Traits of a Good Security Event Message
Advanced Persistent Threats (APTs)
Types of Intrusion Detection
Intrusion Detection Tools and Services
15 Profile: Dr. Dorothy E. Denning
For More Information on Dr. Dorothy E. Denning
16 Profile: Michael Dubinsky
For More Information on Michael Dubinsky
17 Firewalls
What Is a Firewall?
18 Profile: William Cheswick
For More Information on William Cheswick
19 Honeypots
What Is a Honeypot?
Interaction
Why Use a Honeypot?
Catching My Own Russian Spy
Honeypot Resources to Explore
20 Profile: Lance Spitzner
For More Information on Lance Spitzner
21 Password Hacking
Authentication Components
Hacking Passwords
Password Defenses
22 Profile: Dr. Cormac Herley
For More Information on Dr. Cormac Herley
23 Wireless Hacking
The Wireless World
Types of Wireless Hacking
Some Wireless Hacking Tools
Wireless Hacking Defenses
24 Profile: Thomas d’Otreppe de Bouvette
For More Information on Thomas d’Otreppe de Bouvette
25 Penetration Testing
My Penetration Testing Highlights
How to Be a Pen Tester
26 Profile: Aaron Higbee
For More Information on Aaron Higbee
27 Profile: Benild Joseph
For More Information on Benild Joseph
28 DDoS Attacks
Types of DDoS Attacks
DDoS Tool ............

书籍插图:
书籍《HackingtheHacker_LearnFromtheExpertsWhoT.epub》 - 插图1
书籍《HackingtheHacker_LearnFromtheExpertsWhoT.epub》 - 插图2

以上为书籍内容预览,如需阅读全文内容请下载EPUB源文件,祝您阅读愉快。

版权声明:书云(openelib.org)是世界上最大的在线非盈利图书馆之一,致力于让每个人都能便捷地了解我们的文明。我们尊重著作者的知识产权,如您认为书云侵犯了您的合法权益,请参考版权保护声明,通过邮件openelib@outlook.com联系我们,我们将及时处理您的合理请求。 数研咨询 流芳阁 研报之家 AI应用导航 研报之家
书云 Open E-Library » HackingtheHacker_LearnFromtheExpertsWhoT.epub - (EPUB全文下载)