Figure 3.3, Figure 3.4: Mozilla Corporation
Figure 3.5, Figure 13.8: Google
Figure 3.6: HMA
Figure 3.7, Figure 6.11, Figure 13.1, Figure 13.2: Verizon Communications
Figure 4.2, Figure 4.3: Praetox Technologies
Figure 5.2: CEXX.ORG
Figure 5.3 - Figure 5.5: Actiance, Inc
Figure 5.6: Symantec Corporation
Figure 5.7: McAfee, LLC
Figure 5.8, Figure 5.9: Avast Software s.r.o.
Figure 5.10: MalwareBytes
Figure 6.1: Netcraft Ltd
Figure 6.2: Internet Archive
Figure 6.3: NMAP.ORG
Figure 6.4: Massimiliano Montoro
Figure 6.5, Figure 6.6: Shodan
Figure 6.8: Slashdot Media
Figure 6.9: TeraBIT Virus Maker
Figure 6.12: Digital Pharmacist Inc
Figure 7.1: Carnegie Mellon University
Figure 7.2: New Africa/Shutterstock
Figure 7.3: SJ Travel Photo and Video/Shutterstock
Figure 7.4: Reed Kaestner/Getty Images
Figure 7.5: IDRIX
Figure 9.2: Cisco, Inc
Figure 9.4, Figure 9.6, Figure 9.8: Linus Torvalds
Figure 11.4 - Figure 11.8: Tenable, Inc.
Figure 11.9, Figure 11.10: The OWASP Foundation Inc
Figure 11.11, Figure 11.12: Shodan
Figure 11.13, Figure 11.14: OffSec Services Limited
Figure 11.15 - Figure 11.17: Sparta
Figure 11.18: Subgraph
Figure 11.19: Pentest-Tools.com
Figure 11.20: United States Department of Commerce
Figure 12.1: 8studio/123RF
Figure 12.2: Sinn Féin
Figure 12.3: BBC
Figure 12.4, Figure 12.5: AELE
Figure 12.6: David Carney
Figure 12.7: People Drug Store
Figure 12.8: ccPal Store
Figure 13.3: Internet Oracle, Inc
Figure 13.4: U.S. Securities and Exchange Commission
Figure 13.5: Federal Bureau of Investigation
Figure 13.6: Texas Department of Public Safety
Figure 13.7: U.S. Department of Justice
Figure 13.9 - Figure 13.11: Maltego Technologies
Figure 14.1 - Figure 14.5: Exterro, Inc
Figure 14.6, Figure 14.7, Figure 14.11: PassMark™ Software
Figure 14.8, Figure 14.9: Defiant Technologies, LLC
Figure 14.10: robwilson39/123RF
Cover: JLStock/Shutterstock