NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.
»
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
 
 

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, 1st Edition

 
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, 1st Edition,Jayson Street,Kent Nabors,Brian Baskin,Marcus Carey,ISBN9781597495684
 
 
 

  &      &      &      

Syngress

9781597495684

9781597495691

360

Every attack is real. Every defense is real. What will you do with the knowledge?

Print Book + eBook

USD 35.94
USD 59.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 29.95

eBook
eBook Overview

DRM Free included formats: EPub, Mobi, PDF

USD 29.95
Add to Cart
 
 

Key Features

  • Revised edition includes a completely NEW STAR Section (Part 2)
  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
  • Introduces basic hacking techniques in real life context for ease of learning
  • Description

    Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life.

    Yes, the security threats are real!   In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.

    Readership

    Beginner to intermediate security professionals, pen testers and hackers

    Jayson Street

    Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA. At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

    Affiliations and Expertise

    Principle Partner, Stratagem One Solutions, Oklahoma City, OK, USA

    Kent Nabors

    Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent’s background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

    Affiliations and Expertise

    Vice President of Information Security for a multi-billion dollar financial institution

    Brian Baskin

    Brian Baskin is a digital forensics professional employed by CSC and serves as the Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA), part of the Department of Defense Cyber Crime Center (DC3). For more than 10 years, Brian has worked with the DCITA to research, develop, and teach forensic responses to growing cyber threats. Brian devotes much of his time to researching the evolving Internet crimes, network protocol analysis, and Linux and UNIX intrusion responses. Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices. Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).

    Affiliations and Expertise

    Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA)

    Marcus Carey

    Marcus J. Carey is well known for being a compulsive mentor in the information security community. Marcus has more than 17 years of experience in the information security field, working in the military, federal, and private sectors. Marcus served more than 8 years active duty in the U.S. Navy Cryptologic Security Group. Marcus ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended the Department of Defense's secure networks. Marcus earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, 1st Edition

    Part 1: FOrb1dd3n

    PrO1Ogu3

    CHAPTER ON3

    CHAPTER TWO

    CHAPTER THR33

    CHAPTER FOUR

    CHAPTER F1V3

    CHAPTER S1X

    CHAPTER S3V3N

    CHAPTER E1GHT

    CHAPTER N1N3

    CHAPTER T3N

    3P1LOGU3

    PART 2: Security Threats Are Real (STAR) 2.0

    Chapter 1: Recon

    Chapter 2: Scan

    Chapter 3: Explore

    Chapter 4: Exploit

    Chapter 5: Expunge

    Chapter 6: Hacker Culture

    Chapter 7: Bit Bucket

    Quotes and reviews

    "Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc.

    "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH

    "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc.

    "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute

     
     
    Discount on Science and Technology eBooks | Use code DRMFREE
    NOTE: We are upgrading our eBook operations; please allow up to 1-2 days for delivery of your eBook order.