Table of Contents
Preface……………………………………….
For Everyone…………………….
For Teenagers…………………..
Acknowledgments……………………….
Introduction………………………………..
Software Notice………………………….
Getting Into Gear……………………
Programming Languages…………….
C/C++ • Python • Javascript
SQL & Databases
Setting Up a Lab………………………….
Encryption & Cryptography…………..
Passwords………………………………….
Operating Systems….………………….
Windows • Linux • Unix • MAC
Sandboxes
Virtual Machines
Networking…………………………………
Network Penetration • Identifying Users
Geolocation of Users • Wireless Networks
Air Dumping • War Driving
Web Pages & Servers………………….
Browsers • SQL Injection
DoS • DDoS • DMZ
Cloud Security…………………………….
Email…………………………………………
Viruses & Worms………………………..
Phones………………………………………
Android • iPhone • Windows
Games………………………………………
Drone Hacking……………………………
Car Hacking……………………………….
Tools………………………………………….
Being a Security Researcher……….
Bug Bounties
Glossary…………………………………….
Bibliography……………………………….
Suggested Reading…………………….
Web Sites & Links………………………
Notes………………………………………..
Index…………………………………………