January 2015
Intermediate to advanced
656 pages
18h 58m
English
This book has not been compiled and written to be used as a tool by individuals who wish to carry out malicious and destructive activities. It is a tool for people who are interested in extending or perfecting their skills to defend against such attacks and damaging acts.
In this chapter, we cover the following topics:
• Why you need to understand your enemy’s tactics
• The ethical hacking process
• The rise of cyberlaw
• Vulnerability disclosure
Understanding how attacks work is one of the most challenging aspects of defensive security. By familiarizing yourself with how hackers think and ...