Chapter Opener Photo

© -strizh-/Shutterstock, Inc.

References

  1. Anderson, R. (2010). Security engineering: A guide to building dependable distributed systems. Indianapolis, IN: Wiley.

  2. Asay, M. (2004, January 16). The GPL: Understanding the license that governs Linux. Retrieved March 9, 2018, from https://www.novell.com/coolsolutions/feature/1532.html

  3. Biro, M. M. (2016, April 7). How Facebook is recruiting exceptional talent today. Retrieved March 9, 2018, from https://www.huffingtonpost.com/meghan-m-biro-/how-facebook-is-recruiting-exceptional-talent-today_b_9628940.html

  4. Bowen, P., Hash, J., & Wilson, M. (2007, March 7). SP 800-100: Information security handbook: A guide for managers. Retrieved March 9, 2018, from https://csrc.nist.gov/publications/detail/sp/800-100/final

  5. Boyle, R. (2009). Applied information security: A hands-on guide to information security software. Upper Saddle River, NJ: Prentice Hall.

  6. Chakravartula, R. (2016, July 27). What is enumeration? Retrieved February 3, 2018, from http://resources.infosecinstitute.com/what-is-enumeration

  7. A closer look at TCP/IP vulnerabilities. (2016, November 29). Retrieved March 9, 2018, from https://blog.finjan.com/tcpip-vulnerabilities

  8. Collins, J. (n.d.). Controversial, yet effective: How to find people with Zabasearch. Retrieved March 10, 2018, from https://www.lifewire.com/zabasearch-3482267

  9. Cyber crime. (2018, February 20). Retrieved March 9, 2018, from https://www.fbi.gov/investigate/cyber

  10. Description of symmetric and asymmetric encryption. (2017, January 7). Retrieved March 9, 2018, from https://support.microsoft.com/en-us/help/246071/description-of-symmetric-and-asymmetric-encryption

  11. Erickson, J. (2011). Hacking: The art of exploitation. San Francisco, CA: No Starch Press.

  12. Ethical hacking footprinting. (2018, January 8). Retrieved March 10, 2018, from https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_footprinting.htm

  13. Expert: U.S. power grid now “valid target” for hackers. (2016, March 3). Retrieved March 9, 2018, from http://www.cyberwar.news/2016-03-03-expert-national-power-grid-valid-target.html

  14. Free XP rainbow tables. (n.d.). Retrieved March 10, 2018, from http://ophcrack.sourceforge.net/tables.php

  15. Gast, M. S. (2013). 802.11ac: A survival guide. Sebastopol, CA: O’Reilly Media.

  16. Google hacking database (GHDB). (n.d.). Retrieved March 9, 2018, from http://www.exploit-db.com/google-hacking-database

  17. Harris, S., & Maymí, F. (2016). CISSP all-in-one exam guide (7th ed.). New York, NY: McGraw-Hill.

  18. Herzog, P. (n.d.). Open source security testing methodology manual (OSSTMM). Retrieved March 9, 2018, from http://www.isecom.org/research

  19. How to conduct OS fingerprinting with Xprobe2. (2013, September 3). Retrieved March 9, 2018, from https://null-byte.wonderhowto.com/how-to/hack-like-pro-conduct-os-fingerprinting-with-xprobe2-0148439

  20. Huang, A. (2017). The hardware hacker: Adventures in making and breaking hardware. San Francisco, CA: No Starch Press.

  21. ICMP probing. (n.d.). Retrieved March 9, 2018, from http://etutorials.org/Networking/network+security+assessment/Chapter+4.+IP+Network+Scanning/4.1+ICMP+Probing/

  22. Introducing the TCP/IP Protocol suite. (2011, August 1). Retrieved March 9, 2018, from https://docs.oracle.com/cd/E23823_01/html/816-4554/ipov-6.html

  23. Khoury, G. (2016, December 8). When is computer hacking a crime? Retrieved March 10, 2018, from http://blogs.findlaw.com/blotter/2016/12/when-is-computer-hacking-a-crime.html

  24. Kim, D., & Solomon, M. (2018). Fundamentals of information systems security. Burlington, MA: Jones & Bartlett Learning.

  25. Koetter, M. (2008, August 10). Know your enemy: Tracking botnets. Retrieved March 9, 2018, from https://www.honeynet.org/papers/bots

  26. Krebs, B. (2018, March 2). Powerful new DDoS method adds extortion. Retrieved March 10, 2018, from https://krebsonsecurity.com/2018/03/powerful-new-ddos-method-adds-extortion

  27. Lehtinen, R., Russell, D., & Gangemi, G. T. (2006). Computer security basics. Sebastopol, CA: O’Reilly Media.

  28. Lynch, V. (2017, December 9). Re-hashed: The wide world of PKI. Retrieved March 9, 2018, from https://www.thesslstore.com/blog/wide-world-pki

  29. McClure, S., Scambray, J., & Kurtz, G. (2012). Hacking exposed 7: Network security secrets & solutions. New York: McGraw-Hill.

  30. Microsoft threat intelligence archive. (n.d.). Retrieved March 9, 2018, from https://www.microsoft.com/en-us/wdsi/research/antimalware-security-research-papers

  31. Outmesguine, M. (2004, November 12). This Bluetooth extender improves range up to a mile away. Retrieved March 9, 2018, from https://www.popsci.com/diy/article/2004-11/bluetooth-mile-away

  32. Peter, J. (2009, January 14). “Chain of custody” key in Bonds’ case. Retrieved March 10, 2018, from https://www.yahoo.com/news/chain-custody-key-bonds-case-041100784--mlb.html

  33. Piper, F. C., & Murphy, S. (2002). Cryptography: A very short introduction. Oxford, NY: Oxford University Press.

  34. Robertson, S. K. (2017, June 7). Ottawa freezes anti-spam provision, seeks review of legislation. Retrieved March 9, 2018, from https://www.theglobeandmail.com/report-on-business/industry-news/marketing/ottawa-freezes-anti-spam-provision-seeks-review-of-legislation/article35246245

  35. Shimonski, R. (2002, July 1). Hacking techniques: Introduction to password cracking. Retrieved March 9, 2018, from https://www.ibm.com/developerworks/security/library/s-crack/password_cracking.html

  36. Stamp, M. (2011). Information security: Principles and practice. Hoboken, NJ: Wiley.

  37. Stewart, J. M. (2014). Network security, firewalls and VPNs. Burlington, MA: Jones & Bartlett Learning.

  38. Strickland, J. (2007, October 29). How hackers work. Retrieved March 10, 2018, from https://computer.howstuffworks.com/hacker.htm

  39. Wiles, J. (2012). Low tech hacking: Street smarts for security professionals. Waltham, MA: Syngress.

  40. Zetter, K. (2010, March 25). TJX hacker gets 20 years in prison. Retrieved April 12, 2018, from https://www.wired.com/2010/03/tjx-sentencing

  41. Zetter, K. (2010, April 8). Bank of America employee charged with planting malware on ATMs. Retrieved March 9, 2018, from http://www.wired.com/2010/04/bank-of-america-hack

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.185.147