Hacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.
By: Grimes, Roger A [author.]
.
Material type: ![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
What Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics.
Includes index.
Online resource; title from PDF title page (John Wiley, viewed April 26, 2017).
There are no comments for this item.