没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
试读
228页
Hacking the Hacker Learn From the Experts Who Take Down Hackers 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
资源推荐
资源详情
资源评论
Table of Contents
Cover
Title Page
Foreword
Introduction
1 What Type of Hacker Are You?
Most Hackers Aren’t Geniuses
Defenders Are Hackers Plus
Hackers Are Special
Hackers Are Persistent
Hacker Hats
2 How Hackers Hack
The Secret to Hacking
Hacking Ethically
3 Profile: Bruce Schneier
For More Information on Bruce Schneier
4 Social Engineering
Social Engineering Methods
Social Engineering Defenses
5 Profile: Kevin Mitnick
For More Information on Kevin Mitnick
6 Software Vulnerabilities
Number of Software Vulnerabilities
Why Are Software Vulnerabilities Still a Big Problem?
Defenses Against Software Vulnerabilities
Perfect Software Won’t Cure All Ills
7 Profile: Michael Howard
For More Information on Michael Howard
8 Profile: Gary McGraw
For More Information on Gary McGraw
9 Malware
Malware Types
Number of Malware Programs
Mostly Criminal in Origin
Defenses Against Malware
10 Profile: Susan Bradley
For More Information on Susan Bradley
11 Profile: Mark Russinovich
For More on Mark Russinovich
12 Cryptography
What Is Cryptography?
Why Can’t Attackers Just Guess All the Possible Keys?
Symmetric Versus Asymmetric Keys
Popular Cryptography
Hashes
Cryptographic Uses
Cryptographic Attacks
13 Profile: Martin Hellman
For More Information on Martin Hellman
14 Intrusion Detection/APTs
Traits of a Good Security Event Message
Advanced Persistent Threats (APTs)
Types of Intrusion Detection
Intrusion Detection Tools and Services
15 Profile: Dr. Dorothy E. Denning
For More Information on Dr. Dorothy E. Denning
16 Profile: Michael Dubinsky
For More Information on Michael Dubinsky
17 Firewalls
What Is a Firewall?
18 Profile: William Cheswick
For More Information on William Cheswick
19 Honeypots
What Is a Honeypot?
Interaction
Why Use a Honeypot?
Catching My Own Russian Spy
Honeypot Resources to Explore
20 Profile: Lance Spitzner
For More Information on Lance Spitzner
21 Password Hacking
Authentication Components
Hacking Passwords
Password Defenses
22 Profile: Dr. Cormac Herley
For More Information on Dr. Cormac Herley
23 Wireless Hacking
The Wireless World
Types of Wireless Hacking
Some Wireless Hacking Tools
Wireless Hacking Defenses
24 Profile: Thomas d’Otreppe de Bouvette
For More Information on Thomas d’Otreppe de Bouvette
25 Penetration Testing
My Penetration Testing Highlights
How to Be a Pen Tester
26 Profile: Aaron Higbee
For More Information on Aaron Higbee
27 Profile: Benild Joseph
For More Information on Benild Joseph
28 DDoS Attacks
Types of DDoS Attacks
DDoS Tools and Providers
DDoS Defenses
29 Profile: Brian Krebs
For More Information on Brian Krebs
30 Secure OS
How to Secure an Operating System
Security Consortiums
31 Profile: Joanna Rutkowska
For More Information on Joanna Rutkowska
32 Profile: Aaron Margosis
For More Information on Aaron Margosis
33 Network Attacks
Types of Network Attacks
Network Attack Defenses
34 Profile: Laura Chappell
For More Information on Laura Chappell
35 IoT Hacking
How Do Hackers Hack IoT?
IoT Defenses
36 Profile: Dr. Charlie Miller
For More Information on Dr. Charlie Miller
37 Policy and Strategy
Standards
Policies
Procedures
Frameworks
Regulatory Laws
Global Concerns
Systems Support
38 Profile: Jing de Jong Chen
For More Information on Jing de Jong Chen
39 Threat Modeling
Why Threat Model?
Threat Modeling Models
Threat Actors
40 Profile: Adam Shostack
For More Information on Adam Shostack
41 Computer Security Education
Computer Security Training Topics
Training Methods
42 Profile: Stephen Northcutt
For More Information on Stephen Northcutt
43 Privacy
剩余227页未读,继续阅读
资源评论
yinkaisheng-nj
- 粉丝: 763
- 资源: 6953
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于Python的PCA人脸识别算法的原理及实现代码详解+源码+详细代码解析+开发文档+数据(毕业设计&课程设计&项目开发)
- Decision tree20240105(1).ipynb
- zuoyezuoyezuoye
- zuoyezuoyezuoye
- 机械设计电机转子装配设备sw22非常好的设计图纸100%好用.zip
- 作业作业作业作业作业作业
- xdotool.c
- RLMD鲁棒性局部均值分解信号分量可视化(Matlab完整源码和数据)
- Screenshot_2024-04-26-17-17-26-36_9d26c6446fd7bb8e41d99b6262b17def.jpg
- 6.0版本超广角文件+教程使用MT管理器打-7.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功