Cybersecurity
Section Contents
-
Breaking and Entering
Overview of Breaking and Entering by Jeremy N. Smith.
-
Countdown to Zero Day (Stuxnet)
Overview of Countdown to Zero Day (Stuxnet) by Kim Zetter.
-
Ghost in the Wires
Overview of Ghost in the Wires by Kevin Mitnick.
-
Hacking: The Art of Exploitation
Overview of Hacking: The Art of Exploitation by Jon Erickson.
-
Hacking the Human
Overview of Hacking the Human by Ian Mann.
-
Liars & Outliers
Overview of Liars & Outliers by Bruce Schneier.
-
Sandworm
Overview of Sandworm by Andy Greenberg.
-
Social Engineering: The Art of Human Hacking
Overview of Social Engineering: The Art of Human Hacking by Christopher Hadnagy.
-
Stealing the Network: How to Own the Box
Overview of Stealing the Network: How to Own the Box by Syngress.
-
Stealing the Network: Own a Continent
Overview of Stealing the Network: Own a Continent by Joe Grand.
-
Stealing the Network: Own an Identity
Overview of Stealing the Network: Own an Identity by Jay Beale.
-
The Art of Deception
Overview of The Art of Deception by Kevin Mitnick.
-
The Art of Intrusion
Overview of The Art of Intrusion by Kevin Mitnick.
-
The Cuckoo's Egg
Overview of The Cuckoo's Egg by Clifford Stoll.
-
The Shellcoder's Handbook
Overview of The Shellcoder's Handbook by Felix Lindner.