Audiobook10 hours
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Written by Roger A. Grimes
Narrated by Jonathan Todd Ross
Rating: 4 out of 5 stars
4/5
()
About this audiobook
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.
#9679 Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
#9679 Read the stories of some of the world's most renowned computer security experts
#9679 Delve into social engineering, cryptography, penetration testing, network attacks, and more
As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.
#9679 Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
#9679 Read the stories of some of the world's most renowned computer security experts
#9679 Delve into social engineering, cryptography, penetration testing, network attacks, and more
As a field, cybersecurity is large and multi-faceted-yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.
More audiobooks from Roger A. Grimes
Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratings
Related to Hacking the Hacker
Related audiobooks
The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5HACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5We Have Root: Even More Advice from Schneier on Security Rating: 5 out of 5 stars5/5Schneier on Security Rating: 4 out of 5 stars4/5The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Rating: 0 out of 5 stars0 ratingsWorm: The First Digital World War Rating: 4 out of 5 stars4/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5
Computers For You
Elon Musk Rating: 5 out of 5 stars5/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5The Death of Expertise: The Campaign Against Established Knowledge and Why it Matters Rating: 4 out of 5 stars4/5The New New Thing: A Silicon Valley Story Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5Algorithms to Live By: The Computer Science of Human Decisions Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Bored and Brilliant: How Spacing Out Can Unlock Your Most Productive and Creative Self Rating: 4 out of 5 stars4/5Artificial Intelligence For Dummies Rating: 5 out of 5 stars5/5Alone Together: Why We Expect More from Technology and Less from Each Other Rating: 4 out of 5 stars4/5Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor Rating: 4 out of 5 stars4/5Artificial Intelligence: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5The Sentient Machine: The Coming Age of Artificial Intelligence Rating: 4 out of 5 stars4/5AI: Rise of the Lightspeed Learners Rating: 4 out of 5 stars4/5Computer Science Beginners Crash Course: Coding Data, Python, Algorithms & Hacking Rating: 4 out of 5 stars4/5Quantum Computing: The Transformative Technology of the Qubit Revolution Rating: 5 out of 5 stars5/5Once Upon an Algorithm: How Stories Explain Computing Rating: 4 out of 5 stars4/5The Art of Social Media: Power Tips for Power Users Rating: 4 out of 5 stars4/5T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power Rating: 4 out of 5 stars4/5The Emperor's New Mind: Concerning Computers, Minds, and the Laws of Physics Rating: 4 out of 5 stars4/5
Reviews for Hacking the Hacker
Rating: 3.875 out of 5 stars
4/5
16 ratings2 reviews
- Rating: 3 out of 5 stars3/5Good info, but almost unable to listen to the book because they literally read out every hyperlink (and there are a bunch). It should be obvious people listing to an audiobook are busy with another task (e.g. driving, working, etc.) and aren’t going to benefit from hearing a bunch of URLs being read out. Who would need the link to a wiki article out of an audiobook? Really? So very annoying and constantly lose interest when they spend 3 minutes just reading off a bunch of URLs. Besides, links change too often. Just give the address to an online document with all the books links. There. Done.
- Rating: 4 out of 5 stars4/5The book is designed for industry beginners to get basic overview. The content is good and I've learned some knowledge from it, although being only several months in InfoSec it was already pretty much a refresh. What is really annoying though is that there are too many spelled URLs instead of just mentioning easily googleable content. Pls just delete all the URLs and you'll save readers tens of minutes, maybe even an hour. Thanks.
1 person found this helpful