Freshly Printed - allow 10 days lead
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Every attack is real. Every defense is real. What will you do with the knowledge?
Brian Baskin (Author), Marcus J. Carey (Author), Jayson E Street (Author), Kent Nabors (Author)
9781597495684, Elsevier Science
Paperback / softback, published 6 August 2010
360 pages
23.4 x 15.6 x 2.3 cm, 0.74 kg
"The descriptions will be useful for nonsecurity professionals to understand the security jargon in the story and in real life." --Computing Reviews, Dissecting the Hack
"Welcome to hacker fiction—like sci fi, but you don't get to make the good stuff up." --Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.
"There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints." --FX of Phenoelit Recurity Labs GmbH
"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech." --Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.
"Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice." --Stephen Northcutt, President, The SANS Technology Institute
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,? tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real? (STAR), focuses on these real-world lessons.
The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs?—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
Part 1: FOrb1dd3n
PrO1Ogu3
ON3
TWO
THR33
FOUR
F1V3
S1X
S3V3N
E1GHT
N1N3
T3N
3P1LOGU3
PART 2: Security Threats Are Real (STAR) 2.0
1: Recon
2: Scan
3: Explore
4: Exploit
5: Expunge
6: Hacker Culture
7: Bit Bucket
Subject Areas: Computer security [UR]