Main background
Image for Hacking section

Hacking

Books number: 34

Intrusion, hacking, hacker or security hacker in general is a person who examines and explores ways and methods to penetrate and exploit security holes in computer systems or network systems. Mainly these hackers do this practice due to several main reasons including earning money, acquiring information, some challenges and hobbies or for the purpose of examining security devices or systems with the intention of improving performance and protecting systems from hackers. Most security hackers are often under the name of an emerging subculture called the Crypto World. There is a lot of controversy over the concept of the word "penetrator", as this controversy revolves around the fact that the meaning of this word does not fit the current concept of most people. Computer programmers believe that the word "hacker" refers to a person who is proficient and proficient in computer science and network science, while the word "cracker" refers to a security hacker, a person who is always trying to penetrate the security system and computers. A security hacker is known as a black hat hacker, while a cybersecurity expert is known as a white hat hacker.
Cover of The Hacker Playbook 2: Practical Guide To Penetration Testing by Peter Kim

The Hacker Playbook 2: Practical Guide To Penetration Testing

Writer icon

Peter Kim

Hacking

(0)

Cover of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Writer icon

Kevin Mitnick

Hacking

(0)

Cover of The art of invisibility : the world’s most famous hacker teaches you how to be safe in the age of Big Brother and big data by Kevin Mitnick

The art of invisibility : the world’s most famous hacker teaches you how to be safe in the age of Big Brother and big data

Writer icon

Kevin Mitnick

Hacking

(0)

Cover of The art of deception: controlling the human element of security by Kevin Mitnick

The art of deception: controlling the human element of security

Writer icon

Kevin Mitnick

Hacking

(0)

Cover of The Hacker Playbook 3: Practical Guide To Penetration Testing by Peter Kim

The Hacker Playbook 3: Practical Guide To Penetration Testing

Writer icon

Peter Kim

Hacking

(0)

Cover of The Hacker Playbook Practical Guide To Penetration Testing by Peter Kim

The Hacker Playbook Practical Guide To Penetration Testing

Writer icon

Peter Kim

Hacking

(0)

Cover of Hacking the Hacker: Learn From the Experts Who Take Down Hackers by Roger Grimes

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Writer icon

Roger Grimes

Hacking

(0)

Cover of The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers by Kevin Mitnick

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

Writer icon

Kevin Mitnick

Hacking

(0)

Copyright
Cover of Hardware Hacking: Have Fun While Voiding Your Warranty by Kevin Mitnick

Hardware Hacking: Have Fun While Voiding Your Warranty

Writer icon

Kevin Mitnick

Hacking

(0)

Copyright
Cover of Hacking Multifactor Authentication by Roger Grimes

Hacking Multifactor Authentication

Writer icon

Roger Grimes

Hacking

(0)

Copyright
Cover of No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing by Kevin Mitnick

No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing

Writer icon

Kevin Mitnick

Hacking

(0)

Copyright
Cover of Hacking: Hacking Practical Guide for Beginners by Jeff Simon

Hacking: Hacking Practical Guide for Beginners

Writer icon

Jeff Simon

Hacking

(0)

Copyright
Cover of Unauthorised Access: Physical Penetration Testing For IT Security Teams by Kevin Mitnick

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Writer icon

Kevin Mitnick

Hacking

(0)

Copyright
Cover of Cryptography and Network Security by William Stallings

Cryptography and Network Security

Writer icon

William Stallings

Hacking

(0)

Copyright
Cover of Professional Windows Desktop and Server Hardening by Roger Grimes

Professional Windows Desktop and Server Hardening

Writer icon

Roger Grimes

Hacking

(0)

Copyright
Cover of Ransomware Protection Playbook by Roger Grimes

Ransomware Protection Playbook

Writer icon

Roger Grimes

Hacking

(0)

Copyright
Cover of Honeypots for Windows by Roger Grimes

Honeypots for Windows

Writer icon

Roger Grimes

Hacking

(0)

Copyright
Cover of Malicious Mobile Code: Virus Protection for Windows by Roger Grimes

Malicious Mobile Code: Virus Protection for Windows

Writer icon

Roger Grimes

Hacking

(0)

Copyright
Cover of Hacking Secret Ciphers with Python by Al Sweigart

Hacking Secret Ciphers with Python

Writer icon

Al Sweigart

Hacking

(0)

Copyright
Cover of Windows Vista Security: Securing Vista Against Malicious Attacks by Roger Grimes

Windows Vista Security: Securing Vista Against Malicious Attacks

Writer icon

Roger Grimes

Hacking

(0)

View more