000 06873cam a2200865 i 4500
001 ocn983465946
003 OCoLC
005 20240523125540.0
006 m o d
007 cr cnu|||unuuu
008 170421s2017 inu ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dDG1
_dN$T
_dYDX
_dTEFOD
_dIDEBK
_dEBLCP
_dUMI
_dSTF
_dTOH
_dOCLCF
_dIDB
_dOTZ
_dOCLCQ
_dDEBSZ
_dRECBK
_dOCLCA
_dUAB
_dCOO
_dK6U
_dLIV
_dD6H
_dOCLCQ
_dMERUC
_dHCO
_dCEF
_dCUY
_dKSU
_dZCU
_dRRP
_dICG
_dINT
_dBRX
_dVT2
_dOCLCQ
_dUKMGB
_dWYU
_dOCLCQ
_dLVT
_dS9I
_dU3W
_dOCLCQ
_dESU
_dDKC
_dUKAHL
_dOCLCQ
_dBRF
_dOCLCO
_dOCLCQ
_dINARC
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
015 _aGBB779770
_2bnb
016 7 _a018321939
_2Uk
019 _a983872386
_a984223281
_a984283613
_a984545495
_a984676640
_a985242338
_a985260858
_a985279349
_a985346428
_a985396642
_a985399857
_a985401176
_a985483382
_a985636160
_a985762169
_a986022708
_a986475403
_a986723317
_a986806315
_a987331224
_a988756473
020 _a9781119396260
_q(electronic bk. ;
_qoBook)
020 _a1119396263
_q(electronic bk. ;
_qoBook)
020 _a9781119396222
_q(electronic bk.)
020 _a1119396220
_q(electronic bk.)
020 _a9781119396239
020 _a1119396239
020 _z9781119396215
_q(print)
020 _z1119396212
029 1 _aAU@
_b000059917691
029 1 _aAU@
_b000060098484
029 1 _aAU@
_b000060227577
029 1 _aCHBIS
_b011081423
029 1 _aCHNEW
_b000951806
029 1 _aCHVBK
_b484207024
029 1 _aDEBSZ
_b49114105X
029 1 _aGBVCP
_b1004859007
029 1 _aUKMGB
_b018321939
029 1 _aAU@
_b000066157301
035 _a(OCoLC)983465946
_z(OCoLC)983872386
_z(OCoLC)984223281
_z(OCoLC)984283613
_z(OCoLC)984545495
_z(OCoLC)984676640
_z(OCoLC)985242338
_z(OCoLC)985260858
_z(OCoLC)985279349
_z(OCoLC)985346428
_z(OCoLC)985396642
_z(OCoLC)985399857
_z(OCoLC)985401176
_z(OCoLC)985483382
_z(OCoLC)985636160
_z(OCoLC)985762169
_z(OCoLC)986022708
_z(OCoLC)986475403
_z(OCoLC)986723317
_z(OCoLC)986806315
_z(OCoLC)987331224
_z(OCoLC)988756473
037 _aFE56BC1D-7EB0-4C28-AE99-C4011523F72C
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8/7
_223
049 _aMAIN
100 1 _aGrimes, Roger A.,
_eauthor.
245 1 0 _aHacking the hacker :
_blearn from the experts who take down hackers /
_cRoger A. Grimes.
264 1 _aIndianapolis, IN :
_bWiley,
_c2017.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 0 _aITpro collection
505 0 _aWhat Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics.
588 0 _aOnline resource; title from PDF title page (John Wiley, viewed April 26, 2017).
520 _aMeet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.-Go deep into the world of white hat hacking to grasp just how critical cybersecurity is -Read the stories of some of the world's most renowned computer security experts -Learn how hackers do what they do-no technical expertise necessary -Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
504 _aIncludes bibliographical references and index.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aHacking.
650 0 _aComputer security.
650 6 _aPiratage informatique.
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_2fast
650 7 _aHacking
_2fast
758 _ihas work:
_aHacking the hacker (Text)
_1https://id.oclc.org/worldcat/entity/E39PCH3jrRtPYvGkVf4RQrPWjC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aGrimes, Roger A.
_tHacking the hacker.
_dIndianapolis, IN : Wiley, 2017
_z1119396212
_z9781119396215
_w(OCoLC)967719056
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119396260
938 _aInternet Archive
_bINAR
_nhackinghackerlea0000grim
938 _aAskews and Holts Library Services
_bASKH
_nAH32559922
938 _aAskews and Holts Library Services
_bASKH
_nAH32559923
938 _aEBL - Ebook Library
_bEBLB
_nEBL4845208
938 _aEBSCOhost
_bEBSC
_n1506358
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis37318022
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00716090
938 _aYBP Library Services
_bYANK
_n14247966
938 _aYBP Library Services
_bYANK
_n14264169
938 _aYBP Library Services
_bYANK
_n14256206
994 _a92
_bINLUM
999 _c12436
_d12436