The first chapter covers the "what" and "why" of hacking, including a dictionary of terms ( hacker,...
Read More
The first chapter covers the "what" and "why" of hacking, including a dictionary of terms ( hacker, cracker, script kiddie, phreak, white hat/black hat, grey hat, and hacktivism , as well as discussion of the role of the hacker (criminal, magician, security professional, consumer advocate, civil rights activist, cyber warrior); the hacker's motivations (recognition, admiration, curiosity, power & gain, revenge); and legal and ethical issues. The following chapters delve into the specifics of the laws of security, classes of attack, methodology, diffing, cryptography, unexpected input, buffer overflow, sniffing, session hijacking, spoofing, server holes, client holes, and viruses, trojan horses, and worms. A final chapter discusses reporting security problems. Thirteen experts contributed to the creation of this book. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read Less