Hacking Exposed Third Edition

Hacking Exposed

About This Book

Before we started writing, we discussed what we wanted to accomplish in the third edition of Hacking Exposed. We knew that we wanted to write material that was pragmatic and useful,focusing on practical concepts that can be applied in your penetration tests and security assessments. As a result, each chapter starts with a section describing the technology to be hacked, balancing the value of understanding the underlying protocol while not inundating you with an unnecessary amount of background information. After the necessary background material, each chapter describes actionable attack techniques that you can apply against your own targets.
         We knew we wanted to bring in experts for areas where we needed assistance. We were very fortunate to have Tim Kuester and Chris Crowley work with us on the SDR and cellular chapters, both of whom have shown tremendous breadth and depth of knowledge in their fields. Where we couldn’t get the leaders in specific areas to write chapters for us,we brought them in as technical reviewers. Tim Medin provided outstanding reviews of the majority of the chapters in this book, while Mike Ryan provided invaluable insight on four very challenging Bluetooth chapters, and Jean-Louis Bourdon provided his expert insight on the Z-Wave chapter, an area where few people can claim to be security experts.
Download




Before we started writing, we discussed what we wanted to accomplish in the third edition of Hacking Exposed. We knew that we wanted to write material that was pragmatic and useful,focusing on practical

Labels:

Post a Comment

[blogger]

Author Name

Contact Form

Name

Email *

Message *

Powered by Blogger.