• Hacking the Hacker

  • Learn From the Experts Who Take Down Hackers
  • De: Roger A. Grimes
  • Narrado por: Jonathan Todd Ross
  • Duración: 10 h y 46 m
  • 3.7 out of 5 stars (37 calificaciones)

Escucha audiolibros, podcasts y Audibles Originals con Audible Plus por un precio mensual bajo.
Escucha en cualquier momento y en cualquier lugar en tus dispositivos con la aplicación gratuita Audible.
Los suscriptores por primera vez de Audible Plus obtienen su primer mes gratis. Cancela la suscripción en cualquier momento.
Hacking the Hacker  Por  arte de portada

Hacking the Hacker

De: Roger A. Grimes
Narrado por: Jonathan Todd Ross
Prueba por $0.00

Escucha con la prueba gratis de Plus

Compra ahora por US$17.19

Compra ahora por US$17.19

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

  • Go deep into the world of white hat hacking to grasp just how critical cybersecurity is
  • Listen to the stories of some of the world's most renowned computer security experts
  • Delve into social engineering, cryptography, penetration testing, network attacks, and more

As a field, cybersecurity is large and multi-faceted - yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

©2017 John Wiley & Sons, Inc. (P)2019 Tantor

Lo que los oyentes dicen sobre Hacking the Hacker

Calificaciones medias de los clientes
Total
  • 3.5 out of 5 stars
  • 5 estrellas
    15
  • 4 estrellas
    7
  • 3 estrellas
    7
  • 2 estrellas
    4
  • 1 estrella
    4
Ejecución
  • 4 out of 5 stars
  • 5 estrellas
    19
  • 4 estrellas
    4
  • 3 estrellas
    2
  • 2 estrellas
    4
  • 1 estrella
    5
Historia
  • 4 out of 5 stars
  • 5 estrellas
    18
  • 4 estrellas
    7
  • 3 estrellas
    2
  • 2 estrellas
    4
  • 1 estrella
    3

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    3 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Worth the read - depending on what you're seeking

My biggest issue with this book is that I found the title misleading. Based on that I thought the book would spend more time talking about offensive tactics used to actively take down hackers. It really didn't talk about that at all. It was entirely focused on defensive tactics like detection or honeypots. In fact, the author took a pretty hard line stance on not doing anything illegal ever, which seems to encompass hacking into a hacker's machine. Because of this I think the book is pretty poorly named, but maybe I took the title too literally.

With that said, I think this book does a nice job of profiling influential people in the security industry, many of which I had never heard of before. I found these chapters of the book the most interesting, and taught me a bunch of history that I didn't previously know about. It also gave a bunch of references for other books that I am interested in reading.

Pros:
- It has interesting interviews and profiles of notable figures in computer security.
- It has lots of references to other potentially interesting reading material.

Cons:
- It barely mentions anything about actually "Hacking the hacker"
- The non-profile chapters cover topics at a pretty surface level, so if you already have basic computer security knowledge these chapters may be a bit dull or arduous.

Conclusion:
If you're looking for an interesting history book on computer security, I think it's certainly worth the read. If you're just looking for applicable computer security knowledge beyond general philosophy behind computer security, skip this one and look elsewhere.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    2 out of 5 stars
  • Historia
    5 out of 5 stars

We don’t need to read out every single url in detail

Book would be amazing, but listening to him literally read out every single complete url including &$?/ etc… gets very tedious. We get it, one single link read out that leads us to all the links would suffice

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Tribe of Hackers Meets Security/Tutorial Book

I saw this book in the store several times but never picked it up due to the title making me think it was trying to make you literally hack the hacker (which I thought was cringey). I clicked on the sample and was happily surprised as a lot of cybersecurity books don't have great 'listen-ability". The performance was great and kept my attention.

The book was nice talking about some fun stories and information about cybersecurity while going through interviews similar to Tribe of Hackers. I thought it was a great book overall and great listen.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    2 out of 5 stars
  • Historia
    4 out of 5 stars

Please stop reading the urls

There's gotta be a better way to advertise for your friends books than having the reader pronounce double u double u dot ... Every single minute

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 2 personas

  • Total
    4 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    4 out of 5 stars

A Great Beginners Book

An interesting perspective that profiles a lot of security professionals and the industry in general. I really appreciated all of the resources in this book and took plenty of "clips." As someone who already works in cyber intel I still had plenty to learn from this book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

For begginers

This book has good references, but an advanced reader will find these resources very basic.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

This is a great book!

I really enjoyed this books mix of details and positive motivation. As someone who sits around 30 books a year, this is in my top 5 of all time and top cyber security book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    3 out of 5 stars
  • Historia
    3 out of 5 stars

Reading of lengthy URLs

This book would have been much more enjoyable in print format. There was a poor choice made to have the narrator read lengthy URLs like a robot that made listening fairly unenjoyable. No one would have been listening and copying down the obscure URLs mentioned in order to type them in a browser. it felt inauthentic and impractical. A list of URLs could have been provided somewhere and it could have been mentioned that proper URLs could be found at that list otherwise I would have given it 5 stars.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    2 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    2 out of 5 stars

No real information here

This book is basically some guy pimping people he knows and their websites and books. There is no real insight into anything.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    1 out of 5 stars
  • Ejecución
    1 out of 5 stars
  • Historia
    1 out of 5 stars

Urls for recommended books

Whoever decided it was a great idea to read aloud the amazon URLs of book titles with the full URL (that can become obsolete) is a complete moron and makes this otherwise informative book highly irritating.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña