Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Sale!

Original price was: 2.700,00 EGP.Current price is: 1.643,00 EGP.

Description

Price: $27.00 - $16.43
(as of Dec 05,2024 01:15:18 UTC – Details)


Customers say

Customers find the book’s information great, valuable, and insightful into the hacker’s world. They also describe the prose as easy to understand and straightforward. Readers mention the book is interesting and offers great insight relevant to modern times.

AI-generated from the text of customer reviews

This Post Has 13 Comments

  1. Updated information was true useful
    As the victim of a very sophisticated hack, privacy is fundamental , this read was incredible helpful! And utilizing the information we were able to reverse engineer to provide additional critical information for the DA and investigators while escalation protection arsenal – I utilize a frequent gauge to ascertain what signal are presrnt and where, , as difficult as detecting and blocking RF -WiFi -blue tooth can be. I recommend this book for anyone concerned about privacy . You can mute, turn off, not allow -etc etc , but that will not stop someone from listening to your every word! Really – it happens , it happened to me , and utilizing weak security protocols from my FORMER cell provider , my entire identity was stolen by someone access my phone illegally, one they captured my passcodes via my camera and my information thru 24 / 7 ease-dropping, by the time it was discovered it was too late , I would not dare allow anyone to use a phone in my home , or around me without a mic-block and Camera cover – it works and my hackers tried to disable remotely with no success! I keep extra security keys and covers , that I let people around me use to keep our conversations private , at my house you can leave your phone in your car, or use privacy tools ! Once someone gains access to your camera they can see your passcodes or your s keystroke counter to learn it, in real time I was able to screen record a hacker using my user id and passcode, but once I added the NFC card with a second security key , they could not use the passcode alone, they had to have the physical card and key or it would not allow access. A must have for todays AI -black hat hacker world !!! Your WiFi / router can be easily spoofed and utilized to capture all your household! Cover smart appliances , gadgets and even unused equipment – even if it is powered off wolith a dead battery and passcode protected , a hacker can access you devices , laptops , doorbell , cameras etc , cover any items that have blue tooth , RF or WiFi capabilities , especially unused items that can act like a gateway into your life. A wall close to a neighbor’s router ir satellite -we use this as was cover then hang art over it , the kids painted art it after we installed in there rooms. Very durable and works as expected

  2. SIBKISS – See IT Big. Keep IT Simple Somehow.
    This is a must read for any business owner that has employees that use computers. Yeah, pretty much all business owners fill that requirement. Most of us don’t know a damn thing about network security and the few of us that claim a little knowledge can always learn more. This book is not technical, it’s more of an overview of the things that you should be aware of, if you want to have a discussion with your network people and employees when you must address security. I liked the fact that it’s a book you can pick up and put down without losing the flow. I liked how the book takes on various areas of security and the challenges, then has an interview with a luminary in that particular specialty. It’s like getting a front line report from the battle field. I owned a business for 25 years that built web sites and did data management for pharmaceutical companies and internet marketing firms. We had to deal with HIPAA regulations and computer security was always a top priority so I could relate to much of this book.Disclosure: I’ve known Roger Grimes for over 5 years, he is a neighbor, a fellow scuba diver, an avid fisherman and a good friend. I met him after I retired and moved to Key Largo. In the time I’ve known him, I can tell you that Roger is 100% into computer security even when we’re doing other things. It’s not unusual to be 20 miles off shore, trolling for mahi, and have Roger talk about his frustration with unpatched java or how some company just fell prey to a social engineering hack. He loves talking about computer security and has the ability to take complex complicated issues and make them understandable to the non-professional.

  3. A good read
    Was hoping this was a little more technical and less historical, but it’s a good read. You learn a lot about the evolution of hacking and IT security. Very broad.

  4. Interesting and great, as usual.
    I’ve got all of Roger’s books, like the way he writes and the topics he chooses and the helpful info he provides.

  5. quick but disjointed read. Some interesting stories
    Cyber security 101 interspersed with name dropping stories. Not a bad book, just not what I expected.

  6. Great information and a valuable resource
    Even though this book is a couple of years old, all the information in it is still relevant today. I’m very impressed with how Robert breaks down a lot of information to easily understandable segments and interviews a lot of people at the top of their field. What surprised me most is how personable and down to earth the people interviewed are.

  7. A novel approach to IT security books
    The author devotes a chapter to explain a specific field of IT Security (cryptography, pen testing etc.) and then one (or more) to present an interview with an emblematic personality who pioneered or advanced that field. Although I am an experienced security engineer, I still learned a lot and thoroughly enjoyed the countless interviews of distinguished professionals. Highly recommended for the content and the originality of the idea.

  8. Roger does a excellent job of bringing all people into the world of …
    Roger does a excellent job of bringing all people into the world of cybersecurity. We all need to be concerned about this and he is a leading worldwide expert in field, also he writes in a way that from the novice to the expert can all learn from. He gives great real life illustrations that make you understand and think about it. Anyone considering cybersecurity for either personal or profession should read this. A must read.

  9. After reading so many books on security, this is very unique. Awesome book, a must read for every IT professional, not just security professionals. It has wealth of information and motivation contents.

Leave a Reply

Your email address will not be published. Required fields are marked *