Preface
1
What Type of Hacker Are You?
2
How Hackers Hack
3
Bruce Schneier
4
Social Engineering
5
Kevin Mitnick
6
Software Vulnerabilities
7
Profile: Michael Howard
8
Profile: Gary McGraw
9
Malware
10
Profile: Susan Bradley
11
Profile: Mark Russinovich
12
Cryptography
13
Profile: Martin Hellman
14
Intrusion Detection/APTs
15
Profile: Dr. Dorothy E. Denning
16
Profile: Michael Dubinsky
17
Firewalls
18
Profile: William Cheswick
19
Honeypots
20
Profile: Lance Spitzner
21
Password Hacking
22
Profile: Dr. Cormac Herley
23
Wireless Hacking
24
Profile: Thomas d’Otreppe de Bouvette
25
Penetration Testing
26
Profile: Aaron Higbee
27
Profile: Benild Joseph
28
DDoS Attacks
29
Profile: Brian Krebs
30
Secure OS
31
Profile: Joanna Rutkowska
32
Profile: Aaron Margosis
33
Network Attacks
34
Profile: Laura Chappell
35
IoT Hacking
36
Profile: Dr. Charlie Miller
37
Policy and Strategy
38
Profile: Jing de Jong‐Chen
39
Threat Modeling
40
Profile: Adam Shostack
41
Computer Security Education
42
Profile: Stephen Northcutt
43
Privacy
44
Profile: Eva Galperin
45
Patching
46
Profile: Window Snyder
47
Writing as a Career
48
Profile: Fahmida Y. Rashid
49
Guide for Parents with Young Hackers
50
Hacker Code of Ethics