April 2018
Intermediate to advanced
640 pages
17h 12m
English
The purpose of this book is to support individuals who want to refine their ethical hacking skills to better defend against malicious attackers. This book is not written to be used as a tool by those who wish to perform illegal and unethical activities.
In this chapter, we discuss the following topics:
• Know your enemy: understanding your enemy’s tactics
• The gray hat way and the ethical hacking process
• The evolution of cyberlaw
“We cannot solve our problems with the same level of thinking that created them.”
—Albert Eisenstein
The security challenges we face today will pale in comparison to those we’ll face in the future. We already live in a world so highly integrated ...