Book Tips - Understanding Hackers
Understanding hackers
The recent successes of the TV and streaming series "Mr. Robot" and "You Are Wanted" have sparked general interest in the people behind cybercrime. Are hackers just simple criminals or are they sociopathic geniuses who plan the big conspiracy in dark basements? And which global IT corporation is located at 1 Hacker Way, Menlo Park, CA? Excessive fear and powerlessness are rarely a good advisor, even in connection with IT-supported crime. That's why we don't want to keep stoking fears, but rather debunk the hacker myth. If you want to defend yourself effectively against potential cybercrime attacks, you will have to deal with the hackers' big strategies and little tricks. That's why we're presenting the best current German-language books on hacking and cybersecurity.
"Passwords are like underwear. You can't let anyone see them, you have to change them regularly, and you shouldn't swap them with strangers. " - Chris Pirillo
Source: E-3 Magazine - September 2018 issue
Hacking and Security
Only by understanding how an attacker thinks can you really secure your IT systems. This comprehensive handbook is the key. The security professionals around author Michael Kofler provide you with all the know-how you need to protect infrastructures from attacks - practical examples and concrete scenarios included. From securing Active Directory to using Kali Linux, from searching for exploits to hardening web servers. Whether modern web applications, smartphone apps or classic file and web servers - attack vectors are as diverse as the services offered. Many practical examples and concrete scenarios illustrate to you which tools are available and how to use them correctly.
On the trail of the hackers
The author explains in detail the IT methods used to track down the perpetrators, but also where these methods reach their limits. Numerous examples of elaborate attacks in recent years show how the perpetrators lay false trails, but often enough make mistakes that convict them. This book offers a wealth of background knowledge on IT forensics.
Hack network protocols
Network protocols communicate with other devices over a (public) network and are therefore an obvious target for hackers. The book includes a mix of theoretical and practical chapters and provides you with know-how and techniques to capture network traffic, analyze protocols, understand exploits, and discover security vulnerabilities.
WLAN Hacking
Whether smartphone or home WLAN router, the wireless network has weak points. Hackers detect these and develop attack methods. From scouting a WLAN environment to circumventing authentication procedures, the authors provide a comprehensive look at all common ways of attacking wireless data transmission technologies.
Overworld
Los Angeles, 2050: When young hacker Marisa Carneseca receives an invitation to participate in the exclusive Overworld tournament, she is thrilled. Overworld is the most popular virtual reality game in the world. For Marisa, it's a unique opportunity to establish herself as a professional gamer and help her family financially. But Overworld also has a dark, dangerous side...