Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Table of Contents
Foreword
Introduction
1 What Type of Hacker Are You?
Most Hackers Aren’t Geniuses
Defenders Are Hackers Plus
Hackers Are Special
Hackers Are Persistent
Hacker Hats
2 How Hackers Hack
The Secret to Hacking
Hacking Ethically
3 Profile: Bruce Schneier
For More Information on Bruce Schneier
4 Social Engineering
Social Engineering Methods
Social Engineering Defenses
5 Profile: Kevin Mitnick
For More Information on Kevin Mitnick
6 Software Vulnerabilities
Number of Software Vulnerabilities
Why Are Software Vulnerabilities Still a Big Problem?
Defenses Against Software Vulnerabilities
Perfect Software Won’t Cure All Ills
7 Profile: Michael Howard
For More Information on Michael Howard
8 Profile: Gary McGraw
For More Information on Gary McGraw
9 Malware
Malware Types
Number of Malware Programs
Mostly Criminal in Origin
Defenses Against Malware
10 Profile: Susan Bradley
For More Information on Susan Bradley
11 Profile: Mark Russinovich
For More on Mark Russinovich
12 Cryptography
What Is Cryptography?
Why Can’t Attackers Just Guess All the Possible Keys?
Symmetric Versus Asymmetric Keys
Popular Cryptography
Hashes
Cryptographic Uses
Cryptographic Attacks
13 Profile: Martin Hellman
For More Information on Martin Hellman
14 Intrusion Detection/APTs
Traits of a Good Security Event Message
Advanced Persistent Threats (APTs)
Types of Intrusion Detection
Intrusion Detection Tools and Services
15 Profile: Dr. Dorothy E. Denning
For More Information on Dr. Dorothy E. Denning
16 Profile: Michael Dubinsky
For More Information on Michael Dubinsky
17 Firewalls
What Is a Firewall?
18 Profile: William Cheswick
For More Information on William Cheswick
19 Honeypots
What Is a Honeypot?
Interaction
Why Use a Honeypot?
Catching My Own Russian Spy
Honeypot Resources to Explore
20 Profile: Lance Spitzner
For More Information on Lance Spitzner
21 Password Hacking
Authentication Components
Hacking Passwords
Password Defenses
22 Profile: Dr. Cormac Herley
For More Information on Dr. Cormac Herley
23 Wireless Hacking
The Wireless World
Types of Wireless Hacking
Some Wireless Hacking Tools
Wireless Hacking Defenses
24 Profile: Thomas d’Otreppe de Bouvette
For More Information on Thomas d’Otreppe de Bouvette
25 Penetration Testing
My Penetration Testing Highlights
How to Be a Pen Tester
26 Profile: Aaron Higbee
For More Information on Aaron Higbee
27 Profile: Benild Joseph
For More Information on Benild Joseph
28 DDoS Attacks
Types of DDoS Attacks
DDoS Tools and Providers
DDoS Defenses
29 Profile: Brian Krebs
For More Information on Brian Krebs
30 Secure OS
How to Secure an Operating System
Security Consortiums
31 Profile: Joanna Rutkowska
For More Information on Joanna Rutkowska
32 Profile: Aaron Margosis
For More Information on Aaron Margosis
33 Network Attacks
Types of Network Attacks
Network Attack Defenses
34 Profile: Laura Chappell
For More Information on Laura Chappell
35 IoT Hacking
How Do Hackers Hack IoT?
IoT Defenses
36 Profile: Dr. Charlie Miller
For More Information on Dr. Charlie Miller
37 Policy and Strategy
Standards
Policies
Procedures
Frameworks
Regulatory Laws
Global Concerns
Systems Support
38 Profile: Jing de Jong‐Chen
For More Information on Jing de Jong‐Chen
39 Threat Modeling
Why Threat Model?
Threat Modeling Models
Threat Actors
40 Profile: Adam Shostack
For More Information on Adam Shostack
41 Computer Security Education
Computer Security Training Topics
Training Methods
42 Profile: Stephen Northcutt
For More Information on Stephen Northcutt
43 Privacy
Privacy Organizations
Privacy‐Protecting Applications
44 Profile: Eva Galperin
For More Information on Eva Galperin
45 Patching
Patching Facts
Common Patching Problems
46 Profile: Window Snyder
For More Information on Window Snyder
47 Writing as a Career
Computer Security Writing Outlets
Professional Writing Tips
48 Profile: Fahmida Y. Rashid
For More Information on Fahmida Y. Rashid
49 Guide for Parents with Young Hackers
Signs Your Kid Is Hacking
Not All Hacking Is Bad
How to Turn Around Your Malicious Hacker
50 Hacker Code of Ethics
Hacker Code of Ethics
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →