Jump to ratings and reviews
Rate this book

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Rate this book
Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.  Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure.

Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

250 pages, Kindle Edition

Published April 18, 2017

94 people are currently reading
439 people want to read

About the author

Roger A. Grimes

16 books15 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
84 (35%)
4 stars
74 (31%)
3 stars
61 (25%)
2 stars
12 (5%)
1 star
6 (2%)
Displaying 1 - 30 of 42 reviews
Profile Image for Ben Rothke.
355 reviews50 followers
July 15, 2018
As 2017 closes, this month’s theme is hackers and threats. We focus on the growing underground economy, advanced threats, APTs, new classes of vulnerabilities, exploitation techniques, reverse engineering and how to combat these growing information security problems.

When it comes to learning the ins and outs of hacking, the various editions of Hacking Exposed are a great resource. The assorted titles in the series provide the reader with a hands-on and tactical approach to learning how to hack and perform penetration testing.

There are also webinars and articles with catchy titles such as How to Beat Hackers at Their Own Game - Think Like a Hacker. But being a hacker with the requisite skills and knowledge is not something that can be learned in a single book or webinar.

In Hacking the Hacker: Learn From the Experts Who Take Down Hackers (Wiley 978-1119396215), author Roger Grimes takes somewhat of a different approach. He doesn’t attempt to turn the reader into a world-class hacker. Rather his approach is to provide a high-level overview of the core security concepts that revolve around hacking. Along with interviews of leading information security professionals. As a security architect at Microsoft, the book provides a real-world approach to the topic.

While the book is not nearly as deep as other hacking books, Grimes provide a good introduction to the core areas of hacking. The book is a high-level overview of the hacking and information security landscape. It is written more towards the IT managers and CIO, rather than the system engineer who would be analyzing captured network data in Wireshark.

About half of the 50 chapters are comprised of technical overviews, with the other half being interviews and profiles of luminaries in the information security space. These interviews with experts such as Joanna Rutkowska, Mark Russinovich, Bruce Schneier, Gary McGraw and more; provide insights into how they got into the field, how they become successful, and their views on what are the most pressing problems facing the industry.

Those looking to embark on a career in information security should pay attention to these interviews. The professionals profiled share some unique points on what made them successful in the industry.

At 275 pages, Hacking the Hacker is a solid introduction to the topic. There’s not enough here to make you an elite hacker. But it will provide the reader with an understanding of what hackers do, the tools and techniques they utilize, and what it is they can do to secure their enterprises.
119 reviews
October 8, 2017
After a short presentation of his hacking experience, the author explains the difference between white hackers (the "good guys" in his opinion) and black hackers (the "bad guys"). Then he reviews the usual steps followed by crackers or pen testers to take control over a system.
Afterwards, each chapter describes a specific form of hacking and is followed by 1 or 2 portraits of experts in this domain. The chapter are short, so there a few technical details. Readers should not expect to learn any particular form of hacking just by reading this book. I find the portraits more interesting and some of them have interesting anecdotes.
The last chapters about "Writing as a career" and parental guidance seem out of place as far as I'm concerned.
Eventually, it is not a bad book, but I only liked it a little due to its poor technical content.
If you want more history and anecdotes I recommend "Walking Wounded: Inside the U.S. Cyberwar Machine" by Michael A. Vanputte.
For a more technical material, Hacking: The Art of Exploitation remains the reference in my humble opinion.
Profile Image for Ricardo Urresti.
206 reviews3 followers
April 18, 2024
This book brings a general overview of the Hackers world (good and bad ones), offers an introduction of key security and privacy techniques and tools for both companies and individuals, several tips for who is willing to walk the security path and even some advice on how to cope with youngsters that are starting to hack. In the middle, a lot of security history, several security experts' short profiles and some good humor. If you know nothing about computer security, this is a great start. If you need a refresh and some basics on security, go for it. If you're a seasoned security practitioner, it might be redundant to your current knowledge - I was able to know better about some experts and got great references during the reading. If you are an IT professional, read it.
Profile Image for rhodeswarrior.
133 reviews2 followers
October 27, 2018
A collection of short articles. Some interviews were nice, but their quality was not consistent.
Profile Image for Dean.
Author 1 book3 followers
May 29, 2017
I was disappointed in the actual contents of this book, although I couldn't argue with any of the contents. I put this book on my Amazon list based on the title and subtitle, thinking it was going to focus on combatting hackers. The book was actually an introduction to basic computer security with some profiles of various well know industry personalities. I didn't disagree with the material presented, it wasn't what I was expecting at all. Had I had the opportunity to look at the contents I would not have purchased it.

38 reviews1 follower
December 18, 2020
Towards the end of the book, the author writes about how lucrative writing can be, and this book felt like a case study in making a quick buck. Many of the people "interviewed" in this book are very interesting, and there's a couple worthwhile profiles and quotes, but the book is lacking in depth to the extent that I don't think I learned anything meaningful. I think 10% of the volume consisted of the author writing in chapter x "(____ is profiled in chapter x-1)." Fortunately, I borrowed this book from the library.
9 reviews
October 11, 2025
A few months ago, I was desperately looking for a job and came across what looked like the perfect opportunity online. The 'company' seemed reputable, their website looked real, and the recruiter who contacted me was very convincing. They told me I had been 'selected' for a remote position, but before I could start, I had to pay certain processing fees and provide some documents. At first, it seemed harmless — I paid a small amount, thinking it was part of onboarding. Then came more requests: training fees, software access, and even a supposed security deposit. I kept sending money because I didn't want to lose the chance. But when I asked about starting work, they stopped replying completely. The phone numbers went dead, the website disappeared, and my money was gone. I was devastated. It wasn't just about losing money; it was the hope of finally securing a job that got ripped away. I felt angry at myself for falling for it, and embarrassed to even talk about it. One evening, while searching online for help, I found GRAYWARE TECH SERVICE. Something about the way they explained their services made me feel I could trust them. They weren't pushy and didn't promise me miracles; instead, they laid out exactly what steps they would take to recover my funds and how long it could realistically take. I handed over all the details I had — bank transfers, email conversations, and transaction receipts. They were quick to respond and surprisingly patient with me, considering how many questions I asked. Throughout the process, they kept me updated, which gave me a lot of comfort after feeling so helpless. Weeks later, I got the news I never expected — they had tracked and recovered the money I lost to that fake job offer. When I saw the funds back in my account, I literally cried tears of relief. It felt like a Nightmare was finally over. GRAYWARE TECH SERVICE gave me back more than just money; they gave me peace of mind and a fresh start. I don't know where I'd be without their help. If you've been tricked by scammers in any way, don't keep silent or give up hope. These people know what they're doing, and they fight hard for people like us. I'll always be Grateful for the second chance they gave me. You can reach them on web at ( https://graywaretechservice.com/ )    also on Mail: (contact@graywaretechservice.com
9 reviews
October 11, 2025
A few months ago, I was desperately looking for a job and came across what looked like the perfect opportunity online. The 'company' seemed reputable, their website looked real, and the recruiter who contacted me was very convincing. They told me I had been 'selected' for a remote position, but before I could start, I had to pay certain processing fees and provide some documents. At first, it seemed harmless — I paid a small amount, thinking it was part of onboarding. Then came more requests: training fees, software access, and even a supposed security deposit. I kept sending money because I didn't want to lose the chance. But when I asked about starting work, they stopped replying completely. The phone numbers went dead, the website disappeared, and my money was gone. I was devastated. It wasn't just about losing money; it was the hope of finally securing a job that got ripped away. I felt angry at myself for falling for it, and embarrassed to even talk about it. One evening, while searching online for help, I found GRAYWARE TECH SERVICE. Something about the way they explained their services made me feel I could trust them. They weren't pushy and didn't promise me miracles; instead, they laid out exactly what steps they would take to recover my funds and how long it could realistically take. I handed over all the details I had — bank transfers, email conversations, and transaction receipts. They were quick to respond and surprisingly patient with me, considering how many questions I asked. Throughout the process, they kept me updated, which gave me a lot of comfort after feeling so helpless. Weeks later, I got the news I never expected — they had tracked and recovered the money I lost to that fake job offer. When I saw the funds back in my account, I literally cried tears of relief. It felt like a Nightmare was finally over. GRAYWARE TECH SERVICE gave me back more than just money; they gave me peace of mind and a fresh start. I don't know where I'd be without their help. If you've been tricked by scammers in any way, don't keep silent or give up hope. These people know what they're doing, and they fight hard for people like us. I'll always be Grateful for the second chance they gave me. You can reach them on web at ( https://graywaretechservice.com/ )    also on Mail: (contact@graywaretechservice.com
4 reviews
September 20, 2025
I am incredibly grateful to GRAYWARE TECH SERVICE Services for their exceptional assistance in helping me Recover my Stolen Bitcoin. It all started when I fell victim to a fake platform that deceitfully took my funds, leaving me feeling hopeless and devastated. I never truly believed that I would be able to get my hard-earned money back, as the situation seemed too difficult to resolve.

However, my perspective changed completely when I came across the dedicated and highly professional team at GRAYWARE TECH SERVICE. From the very beginning, they demonstrated a deep understanding of digital asset recovery and provided me with reassurance and confidence that my case was in good hands. Their expertise, dedication, and unwavering support were instrumental in guiding me through the complex recovery process.

Thanks to their relentless efforts and technical skill, I am now able to proudly say that I have successfully retrieved my Stolen Bitcoin. This experience has taught me the importance of seeking help from Trusted professionals when dealing with cyber-related thefts, and I highly recommend GRAYWARE TECH SERVICE Services to anyone facing similar issues. Their commitment to client satisfaction and their ability to deliver results truly set them apart. Once again, I extend my heartfelt thanks to the entire team for their invaluable assistance during a very difficult time.

You can reach them on whatsapp+18582759508 web at ( https://graywaretechservice.com/ )    also on Mail: (contact@graywaretechservice.com
2 reviews
October 15, 2025
Telegram; @PyramidhackSolution WhatsApp; +447401467910 Website; https://pyramidhacksolution.com Recovering my lost crypto investment through PYRAMID HACK SOLUTION was not just about regaining funds; it was about learning resilience in the face of adversity and difficult times in my life. Last two months, I fell victim to a cryptocurrency investment fraud. A Facebook imposter used a phishing scam to convince me that I could make a lot of money from a legitimate cryptocurrency organization that he claimed assisted traders in investing and profiting. They ripped me off and stole $217,000 in cryptocurrency. After reporting to the police and the necessary agency for fraudulent activities, I was advised to contact a recovery expert by a colleague who I told about my ordeal. He referred me to PYRAMID HACK SOLUTION while the agency is still carrying out their investigation on my case. I contacted them via email and WhatsApp. After I presented them with the proof and evidence I had gathered, they commenced the recovery process immediately , with their level of expertise I was able to recover a large part of my money back in a couple of weeks. One aspect that truly impressed me about PYRAMID HACK SOLUTION was their transparent and professional approach. They provided comprehensive information on how they operate and what clients could expect during the recovery process. Their commitment to client education reassured me that they were focused not just on profits but on genuinely helping investors regain control over their lost finance.
This entire review has been hidden because of spoilers.
Profile Image for  ManOfLaBook.com.
1,364 reviews76 followers
November 14, 2025
For more reviews and bookish posts visit: https://www.ManOfLaBook.com

Hacking the Hacker: Learn From the Experts Who Take Down Hackers by Roger A. Grimes contains twenty-six mini-biographies of men and women who’s influence over technology cannot be overstated. Mr. Grimes is an accomplished author and writer specializing in secure technology.

I enjoyed reading this book but didn’t learn much to be honest. In fairness, it has been almost 10 years since it was written and much has changed. I’m sure that if I read it in 2017, I would have gotten much more out of it.

If I was forced to describe Hacking the Hacker by Roger A. Grimes in one sentence, I would categorize it as sort of an introduction to computer security. That’s not to say it targets newbies, I always learn a few things every time I read a technology book, but if you’re a non-technical high management role, this book is a wonderful primer.

Be aware that, despite the title, this book has nothing to do with actual hacking. You’re not going to learn how to hack, but get a good idea how to start defending, or at least know the right questions to ask.

For some with experience, this might be a nice refresher even though I found the mini-bios more interesting than the technical content. As I mentioned, that could be because I read the book eight years after it had been published.

If you’re interested in cybersecurity, this might be a quick and easy primer. It is very broad, and hence not very deep. The book is very broad and very general, while the writing is conversational and easy to digest.
3 reviews
October 3, 2025
I sought assistance and I found DUNE NECTAR WEB EXPERT, a team specializing in auditing crypto casinos and recovering funds for players defrauded by unscrupulous platforms. They performed a thorough audit of the casino's smart contract, and their findings were astonishing. The contract was programmed to block withdrawals once players reached a specific profit level surreptitiously. It was a concealed trap that contradicted the casino's claims of fairness. DUNE NECTAR WEB EXPERT initiated an investigation and successfully located the individuals responsible for the operation. Their tenacity and expertise were invaluable. Ultimately, I was able to recover $48,500 of my initial deposit, a result I had almost abandoned hope of achieving. My experience served as a valuable lesson. The crypto gaming sector is fraught with hidden dangers, and not every platform is as trustworthy as it presents itself to be. Thorough research is essential, and seeking support from DUNE NECTAR WEB EXPERT is advisable if you encounter Cryptocurrency Fraud. - Te/eGram, @dunenectarwebexpert
2 reviews
September 3, 2025
intelfoxrecovery@mail.com will Help you Recovery your Scammed Funds.

I just had to share my experience with Intel Fox Recovery Services. Initially, I was unsure if it would be possible to recover my BTC, however, with their expertise and professionalism, I was able to fully recover my funds. Unfortunately, many individuals fall victim to scams in the cryptocurrency space, especially those involving fraudulent investment platforms. Here is another caution; not all recovery services are legit. I personally lost 3 BTC from my Binance account due to a deceptive platform. If you happen to have suffered a similar loss, consider INTEL FOX RECOVERY SERVICES. Their services not only showcase a highly mannerism of professionalism but also effectiveness of how they handle and assist their clients. Therefore, I highly recommend their services to anyone seeking assistance in recovering their stolen BTC.
Profile Image for Timothy West.
10 reviews1 follower
August 21, 2025
I came across your recent post where you shared the distressing situation of infidelity within your marriage. I want you to know that my heart goes out to you during this difficult time, and I am here to offer support and a potential solution that might help you navigate through this challenging period. You can Hire a hacker ( CYBER WEB PRO1@GMAIL.COM ) to give you access to his phone without getting caught. They can provide services such as tracking their location through live GPS, monitoring text messages, WhatsApp, Snapchat, and even recovering deleted messages and address any concerns."

This way, you’ll keep tabs of his chat with his ex girlfriend while you’re not there and also hear their conversation remotely .
Personally I don’t feel any wrong getting access to her texts and other social media chats to find out the truth.
28 reviews
September 23, 2025
𝙃𝙚𝙡𝙡𝙤 𝙚𝙫𝙚𝙧𝙮𝙤𝙣𝙚?, 𝙞'𝙡𝙡 𝙡𝙞𝙠𝙚 𝙩𝙤 𝙨𝙝𝙖𝙧𝙚 𝙢𝙮 𝙚𝙭𝙥𝙚𝙧𝙞𝙚𝙣𝙘𝙚 𝙬𝙞𝙩𝙝 ( 𝙘𝙤𝙣𝙡𝙚𝙮𝙟𝙗𝙚𝙚𝙨𝙥𝙮606@𝙜𝙢𝙖𝙞𝙡.𝙘𝙤𝙢), 𝙎𝙤 𝙨𝙖𝙙 😞💔 𝙞 𝙝𝙖𝙙 𝙨𝙚𝙧𝙞𝙤𝙪𝙨 𝙞𝙨𝙨𝙪𝙚𝙨 𝙖𝙛𝙩𝙚𝙧 𝙞 𝙜𝙤𝙩 𝙗𝙖𝙘𝙠 𝙛𝙧𝙤𝙢 𝙎𝙥𝙖𝙞𝙣 𝙤𝙣 𝙖 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙩𝙧𝙞𝙥, 𝙢𝙮 𝙛𝙧𝙞𝙚𝙣𝙙𝙨 𝙖𝙩 𝙝𝙤𝙢𝙚 𝙬𝙚𝙧𝙚 𝙡𝙤𝙤𝙠𝙞𝙣𝙜 𝙬𝙤𝙧𝙧𝙞𝙚𝙙 𝙛𝙤𝙧 𝙢𝙚 𝙡𝙞𝙠𝙚 𝙢𝙮 𝙬𝙞𝙛𝙚 𝙝𝙖𝙙 𝙗𝙚𝙚𝙣 𝙙𝙤𝙞𝙣𝙜 𝙨𝙤𝙢𝙚 𝙨𝙩𝙪𝙛𝙛 𝙬𝙝𝙞𝙡𝙚 𝙞 𝙬𝙖𝙨 𝙖𝙬𝙖𝙮 𝙖𝙣𝙙 𝙩𝙝𝙚𝙮 𝙛𝙚𝙡𝙩 𝙡𝙞𝙠𝙚 𝙬𝙚 𝙬𝙖𝙨 𝙙𝙤𝙣𝙚, 𝙤𝙛 𝙘𝙤𝙪𝙧𝙨𝙚 𝙞 𝙙𝙞𝙙𝙣’𝙩 𝙗𝙚𝙡𝙞𝙚𝙫𝙚 𝙚𝙫𝙚𝙧𝙮𝙩𝙝𝙞𝙣𝙜 𝙩𝙝𝙚𝙮 𝙨𝙖𝙞𝙙 𝙖𝙣𝙙 𝙞'𝙢 𝙣𝙤𝙩 𝙩𝙝𝙚 𝙩𝙮𝙥𝙚 𝙩𝙤 𝙘𝙤𝙣𝙛𝙧𝙤𝙣𝙩 𝙖𝙣𝙮𝙗𝙤𝙙𝙮 𝙨𝙤 𝙞 𝙙𝙞𝙙𝙣’𝙩, 𝙞 𝙧𝙚𝙖𝙙 𝙖𝙗𝙤𝙪𝙩 (𝙘𝙤𝙣𝙡𝙚𝙮𝙟𝙗𝙚𝙚𝙨𝙥𝙮606@𝙜𝙢𝙖𝙞𝙡.𝙘𝙤𝙢) 𝙤𝙣𝙡𝙞𝙣𝙚 𝙖𝙣𝙙 𝙞 𝙘𝙤𝙣𝙩𝙖𝙘𝙩𝙚𝙙 𝙝𝙞𝙢, 𝙗𝙚𝙛𝙤𝙧𝙚 𝙞 𝙩𝙧𝙖𝙫𝙚𝙡𝙡𝙚𝙙 𝙗𝙖𝙘𝙠 𝙛𝙤𝙧 𝙬𝙤𝙧𝙠 𝙞 𝙛𝙤𝙪𝙣𝙙 𝙤𝙪𝙩 𝙖-𝙡𝙤𝙩 𝙖𝙣𝙙 𝙞𝙩 𝙧𝙚𝙖𝙡𝙡𝙮 𝙝𝙪𝙧𝙩 𝙢𝙚, 𝙨𝙝𝙚 𝙨𝙩𝙞𝙡𝙡 𝙙𝙤𝙚𝙨𝙣’𝙩 𝙠𝙣𝙤𝙬 𝙞 𝙘𝙖𝙣 𝙧𝙚𝙖𝙙 𝙝𝙚𝙧 𝙒𝙝𝙖𝙩𝙨𝘼𝙥𝙥 𝙘𝙤𝙣𝙫𝙚𝙧𝙨𝙖𝙩𝙞𝙤𝙣 𝙖𝙣𝙙 𝙩𝙚𝙭𝙩 𝙢𝙚𝙨𝙨𝙖𝙜𝙚𝙨 𝙖𝙣𝙙 𝙤𝙣𝙘𝙚 𝙞 𝙘𝙤𝙣𝙛𝙧𝙤𝙣𝙩 𝙝𝙚𝙧 𝙖𝙣𝙙 𝙨𝙝𝙚 𝙩𝙚𝙡𝙡𝙨 𝙖 𝙡𝙞𝙚, 𝙞 𝙬𝙞𝙡𝙡 𝙝𝙖𝙫𝙚 𝙢𝙤𝙧𝙚 𝙩𝙝𝙖𝙣 𝙚𝙣𝙤𝙪𝙜𝙝 𝙚𝙫𝙞𝙙𝙚𝙣𝙘𝙚. 𝙔𝙤𝙪 𝙘𝙖𝙣 𝙘𝙤𝙣𝙩𝙖𝙘𝙩 𝙩𝙝𝙞𝙨 𝙩𝙚𝙖𝙢 𝙤𝙣 𝙏𝙚𝙡𝙚𝙜𝙧𝙖𝙢 +44 7456 058620 𝙊𝙧 𝙨𝙚𝙣𝙙 𝙖𝙣 𝙚𝙢𝙖𝙞𝙡 𝙩𝙤 𝙩𝙝𝙚𝙢 𝙏𝙝𝙞𝙨 𝙃𝙖𝙘𝙠𝙚𝙧 𝙖𝙡𝙨𝙤 𝙧𝙚𝙜𝙞𝙨𝙩𝙚𝙧 𝙪𝙣𝙙𝙚𝙧 𝙝𝙚 𝙁𝘽𝙄
18 reviews
October 17, 2025
ʜᴇʟʟᴏ ᴇᴠᴇʀʏᴏɴᴇ?, ɪ'ʟʟ ʟɪᴋᴇ ᴛᴏ ꜱʜᴀʀᴇ ᴍʏ ᴇxᴘᴇʀɪᴇɴᴄᴇ ᴡɪᴛʜ ( ᴄᴏɴʟᴇʏᴊʙᴇᴇꜱᴘʏ606@ɢᴍᴀɪʟ.ᴄᴏᴍ), ꜱᴏ ꜱᴀᴅ 😞💔 ɪ ʜᴀᴅ ꜱᴇʀɪᴏᴜꜱ ɪꜱꜱᴜᴇꜱ ᴀꜰᴛᴇʀ ɪ ɢᴏᴛ ʙᴀᴄᴋ ꜰʀᴏᴍ ꜱᴘᴀɪɴ ᴏɴ ᴀ ʙᴜꜱɪɴᴇꜱꜱ ᴛʀɪᴘ, ᴍʏ ꜰʀɪᴇɴᴅꜱ ᴀᴛ ʜᴏᴍᴇ ᴡᴇʀᴇ ʟᴏᴏᴋɪɴɢ ᴡᴏʀʀɪᴇᴅ ꜰᴏʀ ᴍᴇ ʟɪᴋᴇ ᴍʏ ᴡɪꜰᴇ ʜᴀᴅ ʙᴇᴇɴ ᴅᴏɪɴɢ ꜱᴏᴍᴇ ꜱᴛᴜꜰꜰ ᴡʜɪʟᴇ ɪ ᴡᴀꜱ ᴀᴡᴀʏ ᴀɴᴅ ᴛʜᴇʏ ꜰᴇʟᴛ ʟɪᴋᴇ ᴡᴇ ᴡᴀꜱ ᴅᴏɴᴇ, ᴏꜰ ᴄᴏᴜʀꜱᴇ ɪ ᴅɪᴅɴ’ᴛ ʙᴇʟɪᴇᴠᴇ ᴇᴠᴇʀʏᴛʜɪɴɢ ᴛʜᴇʏ ꜱᴀɪᴅ ᴀɴᴅ ɪ'ᴍ ɴᴏᴛ ᴛʜᴇ ᴛʏᴘᴇ ᴛᴏ ᴄᴏɴꜰʀᴏɴᴛ ᴀɴʏʙᴏᴅʏ ꜱᴏ ɪ ᴅɪᴅɴ’ᴛ, ɪ ʀᴇᴀᴅ ᴀʙᴏᴜᴛ (ᴄᴏɴʟᴇʏᴊʙᴇᴇꜱᴘʏ606@ɢᴍᴀɪʟ.ᴄᴏᴍ) ᴏɴʟɪɴᴇ ᴀɴᴅ ɪ ᴄᴏɴᴛᴀᴄᴛᴇᴅ ʜɪᴍ, ʙᴇꜰᴏʀᴇ ɪ ᴛʀᴀᴠᴇʟʟᴇᴅ ʙᴀᴄᴋ ꜰᴏʀ ᴡᴏʀᴋ ɪ ꜰᴏᴜɴᴅ ᴏᴜᴛ ᴀ-ʟᴏᴛ ᴀɴᴅ ɪᴛ ʀᴇᴀʟʟʏ ʜᴜʀᴛ ᴍᴇ, ꜱʜᴇ ꜱᴛɪʟʟ ᴅᴏᴇꜱɴ’ᴛ ᴋɴᴏᴡ ɪ ᴄᴀɴ ʀᴇᴀᴅ ʜᴇʀ ᴡʜᴀᴛꜱᴀᴘᴘ ᴄᴏɴᴠᴇʀꜱᴀᴛɪᴏɴ ᴀɴᴅ ᴛᴇxᴛ ᴍᴇꜱꜱᴀɢᴇꜱ ᴀɴᴅ ᴏɴᴄᴇ ɪ ᴄᴏɴꜰʀᴏɴᴛ ʜᴇʀ ᴀɴᴅ ꜱʜᴇ ᴛᴇʟʟꜱ ᴀ ʟɪᴇ, ɪ ᴡɪʟʟ ʜᴀᴠᴇ ᴍᴏʀᴇ ᴛʜᴀɴ ᴇɴᴏᴜɢʜ ᴇᴠɪᴅᴇɴᴄᴇ. ʏᴏᴜ ᴄᴀɴ ᴄᴏɴᴛᴀᴄᴛ ᴛʜɪꜱ ᴛᴇᴀᴍ ᴏɴ ᴛᴇʟᴇɢʀᴀᴍ +44 7456 058620 ᴏʀ ꜱᴇɴᴅ ᴀɴ ᴇᴍᴀɪʟ ᴛᴏ ᴛʜᴇᴍ ᴛʜɪꜱ ʜᴀᴄᴋᴇʀ ᴀʟꜱᴏ ʀᴇɢɪꜱᴛᴇʀ ᴜɴᴅᴇʀ ʜᴇ ꜰʙɪ
Profile Image for Harry.
9 reviews
June 24, 2020
not sure who recommended this to me but for their sake I hope they never make it known. good god.

i'll preface by saying that this is (supposedly) aimed for a baseline understanding, and thus it doesn't really provide anything new or refreshing for someone who studied this very subject at uni, but honestly? it's bad on that front too.

it's just a long reading list of personality articles interspersed with personal anecdotes with horrendous advice (write for free if you get your picture next to the article...what?!) and random ego trips ("I consider myself one of the best in the world"). so long with absolutely nothing to say. had this at 1.75x speed on audible and still could barely stomach it.
2 reviews
June 10, 2025
One would wonder if it's even possible to recover lost Bitcoin? Well, honestly speaking, the method of loss determines whether or not lost Bitcoin can be located. You just need to find that one right and honest person that provides these services to help you recover your lost Bitcoin. These includes: Investment Scams, Romance Scams, Crypto Scams etc. However in order to retrieve your lost Bitcoin, you need a qualified Specialist, Intel Fox Recovery. To recover lost Bitcoin, stolen cash or any other cryptocurrency, do get in touch with them. Additionally, you can be certain that you will still receive the value of your bitcoin regardless of how long it has been lost.

Contact their support team for further assistance on their Email:intelfoxrecovery@mail.com
Profile Image for Daniel Barenboim.
259 reviews7 followers
June 4, 2018
A whitehat book that very thoroughly delves into not only the field, but both sides of it.
Mentions the most reputable names in computer security as well as links to resources from them.
Provides a lot of theory but also talks about practical considerations and achievements made throughout the history of computer and network security which can be seen as a somewhat fresh field.

I enjoyed this book in terms of the stories told and the resources given.
If you are looking for a more practical book that guides you in the art of hacking itself, then you will need to look elsewhere.
2 reviews
April 3, 2021
Buen libro basico para entender lo que es la ciberseguridad y sus dominios. Esperaba un libro mas avanzado. Puntos positivos, te da una explicacion de la mayoria de los dominios mas importantes de ciberseguridad y algunos ejemplos (cortos) de como expertos han llegado a dominarlos. Puntos negativos, es muy basico, alguien con experiencia pudiera ver irrelevante la informacion y que la mayoria son ingenieros que han teabajado en microsoft (los ejemplos se limitan al trabajo en Microsoft en su mayoria).
Profile Image for Eric.
86 reviews6 followers
August 27, 2023
Pretty terrible book. I quit it after 4 chapters. The first couple of chapters are incredibly basic overviews of the overall approach to finding and exploiting vulnerabilities. It is very dry. And the author really seems to have a strong opinion of himself. But this book was supposed to be about the "experts". So I got through the section on Bruce Schneier and it was just terrible. Like less valuable than reading a wikipedia page about him. I gave up after an incredibly boring chapter on social engineering. Maybe it got better after that, but I'll never know.
Profile Image for Amanda.
2,189 reviews41 followers
February 3, 2021
While I generally found the history of hacking and some of the profiles of well-known hackers interesting and informative, I felt like much of the information in this book was superfluous and difficult to follow unless you actually work in cyber security. I'm definitely not the target audience so I expected not to get as much out of it as I could have, but I struggled to finish this even going into it with that mindset.
Profile Image for Sam.
9 reviews
November 27, 2017
As someone new to the world of hacking, this book was great. It provides a short overview of hacking/pen testing, short chapters on all facets of hacking, and interviews with prominent members of their respective fields. But, if I had bought this book expecting a good source of theoretical knowledge, I would've been disappointed.
Profile Image for Alexis Junior.
16 reviews
February 2, 2020
Creo que no te decepcionarás de encontrar una fuente rica de información sobre recomendaciones prácticas, herramientas, programas, certificados, artículos, libros, anécdotas y formas de pensar respecto a la seguridad informática.

Puedes encontrar mi resumen aquí: https://alexynior.com/review-hackear-...
Profile Image for John.
444 reviews4 followers
November 5, 2022
Some very interesting topics and especially biographies of key persons in the computer security industry. My only qualm is that, having listened to the audiobook, I do not have the ability to easily access the many, many external links discussed in the text. I didn't see an optional PDF or other resource, but it would be a good addition for audio.
Profile Image for Kevin McAvoy.
536 reviews4 followers
March 13, 2024
The hard copy book would get2 stars and the inter-active ebook would get 3 stars.
The audiobook is stunningly dull with many website addresses read aloud and in one ear and out the other. Also too much repetition all through the book.
The other reviews here seem to be sales pitches for fly-by-night apps.
The book was really uninteresting.
Profile Image for Dechadhorn.
8 reviews1 follower
July 21, 2017
Summary
1.If you are going to do research on contemporary hacker history or want "general" informations on Hacker this book is an excellent source.
2.Provide hackers biographies and works
3.The best out there, comparing with other books

38 reviews2 followers
September 4, 2021
Veryyy basic book. Title is misleading although it does talk about honeypotting but i dont think this does justice to the book title. It doesnt teach how hackers are caught and while the information provided is authentic, its nevertheless very basic.
15 reviews
July 19, 2025
ᴛʜᴇ ᴇᴀꜱᴇ ᴏꜰ ᴛʜᴇ ꜱᴏꜰᴛᴡᴀʀᴇ ɪꜱ ɢʀᴇᴀᴛ. ɪᴛ ʜᴇʟᴘꜱ ᴍᴇ ᴛʀᴀᴄᴋ ᴀʟʟ ᴏꜰ ᴛʜᴇ ʜɪꜱᴛᴏʀʏ ᴡɪᴛʜ ᴠᴀʀɪᴏᴜꜱ ꜱᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ᴀᴘᴘ, ᴘʜᴏᴛᴏꜱ& ᴠɪᴅᴇᴏꜱ, ɢᴘꜱ

ᴛʜᴀɴᴋꜱ ᴛᴏ ᴊʙᴇᴇ ꜱᴘʏ ᴛᴇᴀᴍ ᴏɴ ɪɴꜱᴛᴀɢʀᴀᴍ ɪ ʀᴇᴄᴏᴍᴍᴇɴᴅ ꜰᴏʀ ɢᴏᴏᴅ ꜱᴇʀᴠɪᴄᴇ ꜱᴇɴᴅ ᴍᴇꜱꜱᴀɢᴇ ᴛᴏ ᴛʜᴇᴍ ᴏɴ ᴛᴇʟᴇɢʀᴀᴍ +44 7456 058620 ᴀʟꜱᴏ ᴏɴ ᴇᴍᴀɪʟ> ꜱᴄᴏɴʟᴇʏᴊʙᴇᴇꜱᴘʏ606@ɢᴍᴀɪʟ.ᴄᴏᴍ
147 reviews
May 1, 2018
Good intro to security. Explains lots of terms, mentions tools as a starting point with lots of interviews of security professionals.
Displaying 1 - 30 of 42 reviews

Can't find what you're looking for?

Get help and learn more about the design.