{"id":18766,"date":"2016-09-08T05:00:49","date_gmt":"2016-09-08T12:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=18766"},"modified":"2020-04-21T14:25:31","modified_gmt":"2020-04-21T21:25:31","slug":"the-cybersecurity-canon-hacking-exposed-series","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/09\/the-cybersecurity-canon-hacking-exposed-series\/","title":{"rendered":"The Cybersecurity Canon: Hacking Exposed Series"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/CyberCanon2016_500x85.jpg\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-16615 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/CyberCanon2016_500x85-500x85.jpg\" alt=\"CyberCanon2016_500x85\" width=\"500\" height=\"85\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/CyberCanon2016_500x85.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/CyberCanon2016_500x85-230x39.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/CyberCanon2016_500x85-235x40.jpg 235w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><em>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/nominate-a-book\" target=\"_blank\" rel=\"noopener noreferrer\">directly participate in the process<\/a>. Please do so!<\/em><\/p>\n<p><strong>Book Review by\u00a0<\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Canon Committee Member, Steve Winterfeld<\/strong><\/a><strong>:<\/strong>\u00a0<em>Hacking Exposed Series<\/em> (1999)<em>\u00a0<\/em>by\u00a0McGraw-Hill Education<\/p>\n<h3><strong>Executive Summary<\/strong><\/h3>\n<p>There are not a lot of technical books that meet the definition of <em>\u201c<\/em>timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional\u2019s education that will make the practitioner incomplete,<em>\u201d<\/em> but the <em>Hacking Exposed<\/em> series does. It started in 1999, has sold almost 1 million copies, and has been translated into almost 30 languages.<\/p>\n<p><!--more--><\/p>\n<p>The <em>Hacking Exposed<\/em> series belongs in the Cybersecurity Canon under the technical category as well as history. It is hard to protect your network without understanding the tools and methodologies the hackers, cyber criminals and advanced persistent threats use. This series allows security professionals to quickly educate themselves or look up answers to questions about incidents.<\/p>\n<h3><strong>Review<\/strong><\/h3>\n<p>It had to have been a dark and stormy night when Stuart McClure sat down to write <em>Hacking Exposed<\/em>. The book is designed to give the novice practitioner the framework to build the basic skills needed to become a cybersecurity professional as well as provide reference on specific techniques for the experienced professional.\u00a0 The basic book is broken into four parts \u2013 1) Casing the establishment, 2) Endpoint and server hacking, 3) Infrastructure hacking, and 4) Application and data hacking.<\/p>\n<p>There are several books in the series (most having updated versions) to meet just about every functional or infrastructure need:<\/p>\n<ol>\n<li><em>Hacking Exposed 7: Network Security Secrets &amp; Solutions<\/em> by Stuart McClure<\/li>\n<li><em>Hacking Exposed Wireless, Third Edition: Wireless Security Secrets &amp; Solutions<\/em> by Joshua Wright and Johnny Cache<\/li>\n<li><em>Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets &amp; Solutions<\/em> by Clint Bodungen and Bryan Singer<\/li>\n<li><em>Hacking Exposed Mobile: Security Secrets &amp; Solutions<\/em> by Neil Bergman and Mike Stanfield<\/li>\n<li><em>Hacking Exposed Web Applications<\/em> by Joel Scambray and Vincent Liu<\/li>\n<li><em>Hacking Exposed Unified Communications &amp; VoIP Security Secrets &amp; Solutions<\/em> by Mark Collier and David Endler<\/li>\n<li><em>Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets &amp; Solutions<\/em> by Chris Davis and Aaron Philipp<\/li>\n<li><em>Hacking Exposed: Malware &amp; Rootkits Secrets &amp; Solutions<\/em> by Michael A. Davis and Sean M. Bodmer<\/li>\n<li><em>Hacking Exposed Windows: Microsoft Windows Security Secrets &amp; Solutions <\/em>by Joel Scambray<\/li>\n<li>Hacking Exposed Linux: Linux Security Secrets and Solutions by ISECOM<\/li>\n<li><em>Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions<\/em> by Dwivedi, Himanshu; Lackey, Zane; Cannings, Rich<\/li>\n<\/ol>\n<p>It is vital for cybersecurity professionals to understand how the threat works and what tools and techniques they use. These books are very hands on with sample code, visuals depicting how to use tools, plus features like threat vector maps and a countermeasures cookbook. They are designed to provide practical how-to advice on what to do. They show how to use many of the same tools the threat uses to protect your systems.<\/p>\n<p>Bottom line: This series is mandatory reading if you want to understand what is happening at a technical level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251,2578],"coauthors":[1505],"class_list":["post-18766","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon","tag-stuart-mcclure"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/18766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=18766"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/18766\/revisions"}],"predecessor-version":[{"id":109905,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/18766\/revisions\/109905"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=18766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=18766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=18766"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=18766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}