Hacking the hacker : Learn from the experts who take down hackers

Enregistré dans:
Détails bibliographiques
Auteur principal: Grimes, Roger A. (1966-....). (Auteur)
Support: E-Book
Langue: Anglais
Publié: Indianapolis (Ind.) : Wiley.
Sujets:
Autres localisations: Voir dans le Sudoc
Résumé: Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure
Accès en ligne: Accès à l'E-book
LEADER 03255cmm a2200481 i 4500
001 ebook-272707511
005 20231205015122.0
007 cu|uuu---uuuuu
008 231020s2017||||us ||||g|||| ||||||eng d
020 |a 9781119396239 
035 |a (OCoLC)1411714293 
035 |a FRCYB88945148 
035 |a FRCYB084688945148 
035 |a FRCYB087088945148 
035 |a FRCYB087588945148 
035 |a FRCYB24788945148 
035 |a FRCYB24888945148 
035 |a FRCYB26088945148 
035 |a FRCYB29388945148 
035 |a FRCYB56788945148 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |0 (IdRef)103684565  |1 http://www.idref.fr/103684565/id  |a Grimes, Roger A.  |d (1966-....).  |4 aut.  |e Auteur 
245 1 0 |a Hacking the hacker :  |b Learn from the experts who take down hackers   |c Roger A. Grimes ; [Foreword by Eric Knorr,...]. 
264 1 |a Indianapolis (Ind.) :  |b Wiley. 
264 2 |a Paris :  |b Cyberlibris,  |c 2017. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781119396239.jpg). 
504 |a Index. 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure 
650 7 |0 (IdRef)027248062  |1 http://www.idref.fr/027248062/id  |a Systèmes informatiques  |x Mesures de sûreté.  |2 ram 
650 7 |0 (IdRef)027673006  |1 http://www.idref.fr/027673006/id  |a Cybercriminalité.  |2 ram 
650 7 |0 (IdRef)061614408  |1 http://www.idref.fr/061614408/id  |a Pirates informatiques.  |2 ram 
650 7 |0 (IdRef)234901365  |1 http://www.idref.fr/234901365/id  |a Hacking.  |2 ram 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88945148  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 272707511