000 03444cam a22004817i 4500
001 19506069
003 NUST
005 20221010133553.0
008 170216t20172017inu b 001 0 eng d
010 _a 2017934291
020 _a9781119396215
_q(paperback)
020 _a1119396212
_q(paperback)
035 _a(OCoLC)ocn986788432
040 _aPNX
_beng
_cPNX
_erda
_dOCLCO
_dJQM
_dOCLCQ
_dBDX
_dOCLCF
_dBKL
_dCHVBK
_dOCLCO
_dOCLCA
_dIGA
_dJQW
_dOCL
_dDLC
042 _alccopycat
050 0 0 _aQA76.9.A25
_bG758 2017
082 0 4 _a005.8, GRI
_223
100 1 _aGrimes, Roger A.,
_eauthor.
_999687
245 1 0 _aHacking the hacker :
_blearn from the experts who take down hackers /
_cRoger A. Grimes.
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons, Inc.,
_c[2017]
264 4 _c©2017
300 _axxx, 286 pages ;
_c23 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
505 0 _aWhat type of hacker are you? (Page-1), How hackers hack (Page-9),Profile: Bruce Schneier (Page-23),Social engineering (Page-27),Profile: Kevin Mitnick (Page-33), Software vulnerabilities (Page-39),Profile: Michael Howard (Page-45),Profile: Gary McGraw (Page-51),Malware (Page-55),Profile: Susan Bradley (Page-61),Profile: Mark Russinovich (Page-65),Cryptography (Page-69),Profile: Martin Hellman (Page-75), Intrusion detection/APTs (Page-81),Profile: Dr. Dorothy E. Denning (Page-87),Profile: Michael Dubinsky (Page-91),Firewalls (Page-95),Profile: William Cheskwick (Page-101),Honeypots (Page-107),Profile: Lance Spitzner (Page-111),Password hacking (Page-115),Profile: Dr. Cormac Herley (Page-123),Wireless hacking (Page-127),Profile: Thomas d'Otreppe de Bouvette (Page-133),Penetration testing (Page-137),Profile: Aaron Higbee (Page-147),Profile: Benild Joseph (Page-151),DDoS attacks (Page-155),Profile: Brian Krebs (Page-161),Secure OS (Page-165),Profile: Joanna Rutkowska (Page-171),Profile: Aaron Margosis (Page-175),Network attacks (Page-181),Profile: Laura Chappell (Page-185),IoT hacking (Page-189),Profile: Dr. Charlie Mille (Page-193), Policy and strategy (Page-201),Profile: Jing de Jong-Chen (Page-205),Threat modeling (Page-211),Profile: Adam Shostack (Page-217),Computer security education (Page-221),Profile: Stephen Northcutt (Page-227),Privacy (Page-231),Profile: Eva Galperin (Page-235),Patching (Page-239),Profile: Window Snyder (Page-245),Writing as a career (Page-249),Profile: Fahmida Y. Rashid (Page-259),Guide for parents with young hackers (Page-263),Hacker code of ethics (Page-271).
650 0 _aComputer security.
_9570
650 0 _aHackers.
_927628
650 0 _aHacking.
_999688
650 0 _aCryptography.
650 0 _aComputer networks
_xSecurity measures.
_9466
650 7 _aCOMPUTERS / Security / Cryptography.
_2bisacsh
_96108
650 7 _aCryptography.
_2fast
_0(OCoLC)fst00884552
_999689
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
_9466
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_9570
650 7 _aHackers.
_2fast
_0(OCoLC)fst00872150
_927628
650 7 _aHacking.
_2fast
_0(OCoLC)fst01909643
_999688
650 7 _aComputersicherheit
_2gnd
_994105
710 2 _aInternational Information Systems Security Certification Consortium.
_999690
906 _a7
_bcbc
_ccopycat
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c591620
_d591620