Get full access to Network Security First-Step and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
Chapter 1. Here There Be Hackers!
Essentials First: Looking for a Target
Hacking Innocent Information
Targets of Opportunity
Are You a Target of Opportunity?
Targets of Choice
Are You a Target of Choice?
The Process of an Attack
Reconnaissance and Footprinting (a.k.a. Casing the Joint)
Operating System Attacks
Network Security Organizations
CERT Coordination Center
Center for Internet Security (CIS)
Internet Storm Center
Learning from the Network Security Organizations
Overview of Common Attacks and Exploits
Get Network Security First-Step now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.