He uses the myth of the Trojan Horse—one of the first hacks—in which the Greeks didn’t need to break Troy’s gate or walls to get in ... to identify five key ways that a hacker approach ...