- Table View
- List View
Hacking APIs: Breaking Web Application Programming Interfaces
by Corey J. BallHacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You&’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you&’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you&’ll learn to perform common attacks, like those targeting an API&’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You&’ll also learn techniques for bypassing protections against these attacks. In the book&’s nine guided labs, which target intentionally vulnerable APIs, you&’ll practice: • Enumerating APIs users and endpoints using fuzzing techniques • Using Postman to discover an excessive data exposure vulnerability • Performing a JSON Web Token attack against an API authentication process • Combining multiple API attack techniques to perform a NoSQL injection • Attacking a GraphQL API to uncover a broken object level authorization vulnerability By the end of the book, you&’ll be prepared to uncover those high-payout API bugs other hackers aren&’t finding and improve the security of applications on the web.
Hacking Connected Cars: Tactics, Techniques, and Procedures
by Alissa KnightA field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle’s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars—all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
Hacking The Cyber Threat: A Cybersecurity Primer For Law-enforcement Leaders And Executives
by Pedro CorderoToday’s greatest strategic cybersecurity challenge is the lack of cyber savvy leaders and executives in both the private and public sector. As a leader or executive, how cyber savvy are you? Is your leadership team or mid-management team cyber savvy? Does your strategic leadership on cybersecurity depend on the CIO, CISO, or IT Director to explain all the cybersecurity issues impacting your organization and you only understand a minimal aspect of this threat?
Hacking Diversity: The Politics of Inclusion in Open Technology Cultures (Princeton Studies in Culture and Technology #21)
by Christina Dunbar-HesterA firsthand look at efforts to improve diversity in software and hackerspace communitiesHacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. Hacking Diversity investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support.Christina Dunbar-Hester shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. She brings together more than five years of firsthand research: attending software conferences and training events, working on message boards and listservs, and frequenting North American hackerspaces. She explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, Dunbar-Hester demonstrates that while the preferred solutions of tech enthusiasts—their “hacks” of projects and cultures—can ameliorate some of the “bugs” within their own communities, these methods come up short for issues of unequal social and economic power. Distributing “diversity” in technical production is not equal to generating justice.Hacking Diversity reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.
Hacking Etico 101
by Karina Astudillo Alessandro BarducciCome hackeare professionalmente in meno di 21 giorni! Comprendere la mente dell’hacker, realizzare ricognizioni, scansioni ed enumerazione, effettuazione di exploit, come scrivere una relazione professionale, e altro ancora! Contenuto: •La cerchia dell'hacking •Tipi di hacking, modalità e servizi opzionale •Riconoscimento passivo e attivo •Google hacking, WhoIs e nslookup •Footprinting con Maltego e Sam Spade •Metodi di scansione e stati della porta •Scansione con NMAP •Analisi della vulnerabilità con Nexpose e OpenVAS •Enumerazione di Netbios •Meccanismi di hacking •Metasploit Framework •Attacchi di chiave •Attacchi di malware •Attacchi DoS •Windows hacking con Kali Linux e Metasploit •Hacking Wireless con Aircrack-ng •Cattura di chiavi con sniffer di rete •Attacchi MITM con Ettercap e Wireshark •Ingegneria sociale con il SET Toolkit •Phishing e iniettando malware con SET •Hacking Metasploitable Linux con Armitage •Suggerimenti per scrivere una buona relazione di controllo •Certificazioni di sicurezza informatica e hacking pertinente
Hacking Europe
by Gerard Alberts Ruth OldenzielHacking Europe traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European countries at the end of the Cold War, the book shows the digital development was not an exclusively American affair. Local hacker communities appropriated the computer and forged new cultures around it like the hackers in Yugoslavia, Poland and Finland, who showed off their tricks and creating distinct "demoscenes. " Together the essays reflect a diverse palette of cultural practices by which European users domesticated computer technologies. Each chapter explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. More generally, the "ludological" element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the history of technology.
Hacking Exposed: Network Security Secrets and Solutions (6th Edition)
by Stuart Mcclure Joel Scambray George KurtzMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code
Hacking Exposed Windows: Microsoft Security Secrets and Solutions (Third Edition)
by Joel Scambray Stuart McclureMeet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomizationion
Hacking For Beginners: The Ultimate Guide To Becoming A Hacker
by Bob BittexAre you interested in hacking? Always been curious about hacking but never did anything? Simply browsing and looking for a new awesome computer-related hobby?Then this book is for you!This book will teach the basics and details of hacking as well as the different types of hacking. The book is targeted towards beginners who have never hacked before and are not familiar with any of the terms in hacking. The book includes practical examples with pictures and exercises that can be done online. I am Bob Bittex - ethical hacker, computer science teacher, security researcher and analyst and I would like to invite you to the world of hacking. This book includes: An introduction to hacking and hacking terms Potential security threats to computer systems What is a security threat Skills required to become an ethical hacker Programming languages for hacking Other necessary skills for hackers Hacking tools Social engineering Cryptography, cryptanalysis, cryptology Password cracking techniques and tools Worms, viruses and trojans ARP poisoning Wireshark - network and password sniffing Hacking wi-fi (wireless) networks Dos (Denial of Service) Attacks, ping of death, DDOS Hacking a web server Hacking websites SQL injections Hacking Linux OS Most common web security vulnerabilities Are you ready to learn about hacking?Scroll up, hit that buy button!
Hacking For Dummies
by Kevin BeaverUpdated for Windows 8 and the latest version of LinuxThe best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.Guides you through the techniques and tools you need to stop hackers before they hack youCompletely updated to examine the latest hacks to Windows 8 and the newest version of LinuxExplores the malicious hackers's mindset so that you can counteract or avoid attacks completelySuggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in placeIf you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.
Hacking For Dummies
by Kevin BeaverStop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.
Hacking For Dummies
by Kevin BeaverLearn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You’ll find out how to: Stay on top of the latest security weaknesses that could affect your business’s security setup Use freely available testing tools to “penetration test” your network’s security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.
Hacking for Dummies (4th Edition)
by Kevin BeaverUpdated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices. Guides you through the techniques and tools you need to stop hackers before they hack you Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.
Hacking Healthcare: How AI and the Intelligence Revolution Will Reboot an Ailing System
by Tom LawryIn this original work, Tom Lawry takes readers on a journey of understanding what we learned from fighting a global pandemic and how to apply these learnings to solve healthcare's other big challenges. This book is about empowering clinicians and consumers alike to take control of what is important to them by harnessing the power of AI and the Intelligent Health Revolution to create a sustainable system that focuses on keeping all citizens healthy while caring for them when they are not.
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
by Fred Trotter David UhlmanReady to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of thousands of IT professionals, but it’s also a huge challenge: the program requires a complete makeover of archaic records systems, workflows, and other practices now in place.This book points out how hospitals and doctors’ offices differ from other organizations that use IT, and explains what’s necessary to bridge the gap between clinicians and IT staff.Get an overview of EHRs and the differences among medical settingsLearn the variety of ways institutions deal with patients and medical staff, and how workflows varyDiscover healthcare’s dependence on paper records, and the problems involved in migrating them to digital documentsUnderstand how providers charge for care, and how they get paidExplore how patients can use EHRs to participate in their own careExamine healthcare’s most pressing problem—avoidable errors—and how EHRs can both help and exacerbate it
Hacking ISIS: How to Destroy the Cyber Jihad
by Malcolm Nance Christopher SampsonThis book is written by two of the leading terrorist experts in the world - Malcolm Nance, NBC News/MSNBC terrorism analyst and Christopher Sampson, cyber-terrorist expert. Malcolm Nance is a 35 year practitioner in Middle East Special Operations and terrorism intelligence activities. Chris Sampson is the terrorism media and cyber warfare expert for the Terror Asymmetric Project and has spent 15 years collecting and exploiting terrorism media. For two years, their Terror Asymmetrics Project has been attacking and exploiting intelligence found on ISIS Dark Web operations.Hacking ISIS will explain and illustrate in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world.More, the book will map out the cyberspace level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in Cyberspace and how to stop it in its tracks.Hacking ISIS is uniquely positioned to give an insider’s view into how this group spreads its ideology and brainwashes tens of thousands of followers to join the cult that is the Islamic State and how average computer users can engage in the removal of ISIS from the internet.
Hacking Kubernetes: Threat-Driven Analysis and Defense
by Andrew Martin Michael HausenblasWant to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configuration to help you harden clusters from possible angles of attack.This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.Understand where your Kubernetes system is vulnerable with threat modelling techniquesFocus on pods, from configurations to attacks and defensesSecure your cluster and workload trafficDefine and enforce policy with RBAC, OPA, and KyvernoDive deep into sandboxing and isolation techniquesLearn how to detect and mitigate supply chain attacksExplore filesystems, volumes, and sensitive information at restDiscover what can go wrong when running multitenant workloads in a clusterLearn what you can do if someone breaks in despite you having controls in place
Hacking Life: Systematized Living and Its Discontents (Strong Ideas)
by Joseph M. ReagleIn an effort to keep up with a world of too much, life hackers sometimes risk going too far.Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everything as a system composed of parts that can be decomposed and recomposed, with algorithmic rules that can be understood, optimized, and subverted. In Hacking Life, Joseph Reagle examines these attempts to systematize living and finds that they are the latest in a long series of self-improvement methods. Life hacking, he writes, is self-help for the digital age's creative class.Reagle chronicles the history of life hacking, from Benjamin Franklin's Poor Richard's Almanack through Stephen Covey's 7 Habits of Highly Effective People and Timothy Ferriss's The 4-Hour Workweek. He describes personal outsourcing, polyphasic sleep, the quantified self movement, and hacks for pickup artists. Life hacks can be useful, useless, and sometimes harmful (for example, if you treat others as cogs in your machine). Life hacks have strengths and weaknesses, which are sometimes like two sides of a coin: being efficient is not the same thing as being effective; being precious about minimalism does not mean you are living life unfettered; and compulsively checking your vital signs is its own sort of illness. With Hacking Life, Reagle sheds light on a question even non-hackers ponder: what does it mean to live a good life in the new millennium?
Hacking Matter: Levitating Chairs, Quantum Mirages, and the Infinite Weirdness of Programmable Atoms
by Wil MccarthyProgrammable matter is probably not the next technological revolution, nor even perhaps the one after that. But it's coming, and when it does, it will change our lives as much as any invention ever has. Imagine being able to program matter itself-to change it, with the click of a cursor, from hard to soft, from paper to stone, from fluorescent to super-reflective to invisible. Supported by organizations ranging from Levi Strauss and IBM to the Defense Department, solid-state physicists in renowned laboratories are working to make it a reality. In this dazzling investigation, Wil McCarthy visits the laboratories and talks with the researchers who are developing this extraordinary technology, describes how they are learning to control it, and tells us where all this will lead. The possibilities are truly astonishing.
Hacking Multifactor Authentication
by Roger A. GrimesProtect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
Hacking MySQL: Breaking, Optimizing, and Securing MySQL for Your Use Case
by Lukas VileikisYour MySQL instances are probably broken. Many developers face slow-running queries, issues related to database architecture, replication, or database security—and that’s only the beginning. This book will deliver answers to your most pressing MySQL database questions related to performance, availability, or security by uncovering what causes databases to break in the first place. At its core, this book provides you with the knowledge necessary for you to break your database instances so you can better optimize it for performance and secure it from data breaches. In other words, you’ll discover the sorts of actions, minor and major, that degrade databases so you can fix and ultimately preempt them. MySQL sometimes acts according to its own rules, and this book will help you keep it working on your terms. At the same time, you will learn to optimize your backup and recovery procedures, determine when and which data to index to achieve maximum performance, and choose the best MySQL configurations, among other essential skills. Most MySQL books focus exclusively on optimization, but this book argues that it’s just as important to pay attention to the ways databases break. Indeed, after reading this book, you will be able to safely break your database instances to expose and overcome the nuanced issues that affect performance, availability, and security. What You Will Learn Know the basics of MySQL and the storage engines innoDB and MyISAM Spot the ways you are harming your database’s performance, availability and security without even realizing it Fix minor bugs and issues that have surprisingly serious impact Optimize schema, data types, queries, indexes, and partitions to head off issues Understand key MySQL security strategies Who This Book Is For Database administrators, web developers, systems administrators, and security professionals with an intermediary knowledge of database management systems and building applications in MySQL
Hacking Point of Sale
by Slava GomzinMust-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
Hacking the Future: Privacy, Identity, and Anonymity on the Web
by Cole StrykerIs anonymity a crucial safeguard—or a threat to society? &“One of the most well-informed examinations of the Internet available today&” (Kirkus Reviews). &“The author explores the rich history of anonymity in politics, literature and culture, while also debunking the notion that only troublemakers fear revealing their identities to the world. In relatively few pages, the author is able to get at the heart of identity itself . . . Stryker also introduces the uninitiated into the &‘Deep Web,&’ alternative currencies and even the nascent stages of a kind of parallel Web that exists beyond the power of governments to switch it off. Beyond even that is the fundamental question of whether or not absolute anonymity is even possible.&” —Kirkus Reviews &“Stryker explains how significant web anonymity is to those key companies who mine user data personal information of, for example, the millions of members on social networks. . . . An impassioned, rational defense of web anonymity and digital free expression.&” —Publishers Weekly
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
by Roger A. GrimesMeet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
Hacking the Human: Social Engineering Techniques and Security Countermeasures
by Ian MannInformation security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.