Hacking the Hacker: Learn From the Experts Who Take Down Hackers
- 10h 46m 29s
- Roger A. Grimes
- Recorded Books, Inc.
- 2019
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
In this Audiobook
-
Chapter 1 - What Type of Hacker are You?
-
Chapter 2 - How Hackers Hack
-
Chapter 3 - Profile: Bruce Schneier
-
Chapter 4 - Social Engineering
-
Chapter 5 - Profile: Kevin Mitnick
-
Chapter 6 - Software Vulnerabilities
-
Chapter 7 - Profile: Michael Howard
-
Chapter 8 - Profile: Gary McGraw
-
Chapter 9 - Malware
-
Chapter 10 - Profile: Susan Bradley
-
Chapter 11 - Profile: Mark Russinovich
-
Chapter 12 - Cryptography
-
Chapter 13 - Profile: Martin Hellman
-
Chapter 14 - Intrusion Detection/APTs
-
Chapter 15 - Profile: Dr. Dorothy E. Denning
-
Chapter 16 - Profile: Michael Dubinsky
-
Chapter 17 - Firewalls
-
Chapter 18 - Profile: William Cheswick
-
Chapter 19 - Honeypots
-
Chapter 20 - Profile: Lance Spitzner
-
Chapter 21 - Password Hacking
-
Chapter 22 - Profile: Dr. Cormac Herley
-
Chapter 23 - Wireless Hacking
-
Chapter 24 - Profile: Thomas d'Otreppe de Bouvette
-
Chapter 25 - Penetration Testing
-
Chapter 26 - Profile: Aaron Higbee
-
Chapter 27 - Profile: Benild Joseph
-
Chapter 28 - DDos Attacks
-
Chapter 29 - Profile: Brian Krebs
-
Chapter 30 - Secure OS
-
Chapter 31 - Profile: Joanna Rutkowska
-
Chapter 32 - Profile: Aaron Margosis
-
Chapter 33 - Network Attacks
-
Chapter 34 - Profile: Laura Chappell
-
Chapter 35 - IoT Hacking
-
Chapter 36 - Profile: Dr. Charlie Miller
-
Chapter 37 - Policy and Strategy
-
Chapter 38 - Profile: Jing de Jong-Chen
-
Chapter 39 - Threat Modeling
-
Chapter 40 - Profile: Adam Shostack
-
Chapter 41 - Computer Security Education
-
Chapter 42 - Profile: Stephen Northcutt
-
Chapter 43 - Privacy
-
Chapter 44 - Profile: Eva Galperin
-
Chapter 45 - Patching
-
Chapter 46 - Profile: Window Snyder
-
Chapter 47 - Writing as a Career
-
Chapter 48 - Profile: Fahmida Y. Rashid
-
Chapter 49 - Guide for Parents with Young Hackers
-
Chapter 50 - Hacker Code of Ethics
SHOW MORE
FREE ACCESS