Hacking: The Next Generation

Dublin Core

Title

Hacking: The Next Generation

Description

Main Argument: The authors identify new hacking techniques and abilities. Essentially, this book provides examples of hacking attacks and helps prepare for any future cyber threat. They emphasize that hackers now use social media sites, mobile devices, etc. so it's imperative to be protect against attacks. 

Style: Popular

Sourcing: No bibliography. 

Structure: 10 chapters, Examples, Index

Context in discussion: Government, military and security experts do not often discuss motives or specific ways hackers attack computers and networks. This book provides a look into a hacking world by offering specific examples of hacking attacks. 

Context in website: To learn more about a hacker's perspective/fears about how cyber attacks will develop, hacker Jeff Moss'speech at the Black Hat Conference 2010 is insightful and interesting. Main Argument: The authors identify new hacking techniques and abilities. Essentially, this book provides examples of hacking attacks and helps prepare for any future cyber threat. They emphasize that hackers now use social media sites, mobile devices, etc. so it's imperative to be protect against attacks. Style: Popular Sourcing: No bibliography. Structure: 10 chapters, Examples, Index Context in discussion: Government, military and security experts do not often discuss motives or specific ways hackers attack computers and networks. This book provides a look into a hacking world by offering specific examples of hacking attacks. Context in website: In order to learn more about a hacker's perspective/fears about how cyber attacks will develop. 

Creator

Dhanjani, Nitesh

Credentials: 
Manager at consulting firm Senior Director at Application Security and Assessments
Masters, Purdue University

Rios, Billy

Credentials:
Senior Engineer for Microsoft Senior Security
Consultant US Department of Defense networks
Officer in the US Marine Corp

Hardin, Brett

Credentials:
Security Research, McAfee
Penetration tester, Ernst and Young's Advanced Security Center B.S., California State University Chico

Zotero

Collection

Tags

Citation

Dhanjani, Nitesh Credentials:Manager at consulting firm Senior Director at Application Security and Assessments Masters, Purdue University, "Hacking: The Next Generation ," in Cyberwar Resources Guide, Item #29, https://www.projectcyw-d.org/resources/items/show/29 (accessed November 22, 2024).