SitePoint
  • Premium
  • Library
  • Community
  • Jobs
  • Blog
LoginStart Free Trial

The home for developers

Track your course progress, manage projects, and find your dream job - all in one place.

Start Your Free Trial

7 Day Free Trial. Cancel Anytime.

SitePoint Premium

  • Access to 700+ courses
  • Publish articles on SitePoint
  • Daily curated jobs
  • Learning Paths
  • Discounts to dev tools
  • Library/
  • Text courses/
  • Hacking the Hacker
Hacking the Hacker

Hacking the Hacker


Course details

4.0∙1 Rating1 review

Published
April 2017
Publisher
Wiley
Chapters
50

About the course

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Read the stories of some of the world's most renowned computer security experts
  • Learn how hackers do what they do—no technical expertise necessary
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Author

Roger A. Grimes

Roger A. Grimes

Roger A. Grimes has been fighting malicious computer hackers for three decades (since 1987). He’s earned dozens of computer security certifications (including CISSP, CISA, MCSE, CEH, and Security+), and he even passed the very tough Certified Public Accountants (CPA) exam, although it has nothing to do with computer security. He has created and updated computer security classes, been an instructor, and taught thousands of students how to hack or defend. Roger is a frequent presenter at national computer security conferences.

Course Outline

Chapter 1: What Type of Hacker Are You?
Chapter 2: How Hackers Hack
Chapter 3: Bruce Schneier
Chapter 4: Social Engineering
Chapter 5: Kevin Mitnick
Chapter 6: Software Vulnerabilities
Chapter 7: Profile: Michael Howard
Chapter 8: Profile: Gary McGraw
Chapter 9: Malware
Chapter 10: Profile: Susan Bradley
Chapter 11: Profile: Mark Russinovich
Chapter 12: Cryptography
Chapter 13: Profile: Martin Hellman
Chapter 14: Intrusion Detection/APTs
Chapter 15: Profile: Dr. Dorothy E. Denning
Chapter 16: Profile: Michael Dubinsky
Chapter 17: Firewalls
Chapter 18: Profile: William Cheswick
Chapter 19: Honeypots
Chapter 20: Profile: Lance Spitzner
Chapter 21: Password Hacking
Chapter 22: Profile: Dr. Cormac Herley
Chapter 23: Wireless Hacking
Chapter 24: Profile: Thomas d’Otreppe de Bouvette
Chapter 25: Penetration Testing
Chapter 26: Profile: Aaron Higbee
Chapter 27: Profile: Benild Joseph
Chapter 28: DDoS Attacks
Chapter 29: Profile: Brian Krebs
Chapter 30: Secure OS
Chapter 31: Profile: Joanna Rutkowska
Chapter 32: Profile: Aaron Margosis
Chapter 33: Network Attacks
Chapter 34: Profile: Laura Chappell
Chapter 35: IoT Hacking
Chapter 36: Profile: Dr. Charlie Miller
Chapter 37: Policy and Strategy
Chapter 38: Profile: Jing de Jong‐Chen
Chapter 39: Threat Modeling
Chapter 40: Profile: Adam Shostack
Chapter 41: Computer Security Education
Chapter 42: Profile: Stephen Northcutt
Chapter 43: Privacy
Chapter 44: Profile: Eva Galperin
Chapter 45: Patching
Chapter 46: Profile: Window Snyder
Chapter 47: Writing as a Career
Chapter 48: Profile: Fahmida Y. Rashid
Chapter 49: Guide for Parents with Young Hackers
Chapter 50: Hacker Code of Ethics

Reviews
4.0

1 total

0
1
0
0
0

Course details

4.0∙1 Rating1 review

Published
April 2017
Publisher
Wiley
Chapters
50

SitePoint

Stuff we do

  • Premium
  • Newsletters
  • Learning paths
  • Library
  • Forums

Contact

  • Contact us
  • FAQ
  • Publish your book
  • Write an article
  • Advertise

About

  • Our Story
  • Corporate Memberships
  • Start free trial
  • Login

Connect

  • RSS
  • Facebook
  • Twitter (X)
  • Instagram

Subscribe to our newsletter

Get the freshest news and resources for developers, designers and digital creators in your inbox each week

© 2000 – 2025 SitePoint Pty. Ltd.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Terms of usePrivacy policy