Syndetics cover image
Image from Syndetics

Dissecting the hack the forb1dd3n network / Jayson E. Street ... [et al.].

Contributor(s): Street, Jayson E.
Material type: TextTextPublisher: Amsterdam ; Boston : Syngress, c2010Edition: Rev. ed.General Notes: EBSCO PDA Program; Previous ed. by Jayson E. Street.Bibliography: Includes bibliographical references and index.Description: 1 online resource (xx, 333 p.) : ill.Content type: text Media type: computer Carrier type: online resourceISBN: 9781597495691 (electronic bk.).Subject(s): Computer crimes -- Investigation | Computer crimes -- Case studies | Hackers | Computer networks -- Security measures | Computer securityGenre/Form: Electronic books. DDC classification: 364.16/8 Online resources: Access full-text materials at no charge:
Contents:
H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network -- Part 1: F0RB1DD3N -- PR010GU3 -- Chapter 0N3 -- Chapter TW0 -- Chapter THR33 -- Chapter F0UR -- Chapter F1V3 -- Chapter S1X -- Chapter S3V3N -- Chapter E1GHT -- Chapter N1N3 -- Chapter T3N -- 3P1L0GU3 -- Part 2: Security threats are real (STAR) 2.0: Chapter 1. Recon -- Chapter 2. Scan -- Chapter 3. Explore -- Chapter 4. Exploit -- Chapter 5. Expunge -- Chapter 6. Hacker Culture -- Chapter 7. Bit Bucket.
Summary: Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 364.16/8 (Browse shelf(Opens below)) Not For Loan mq601196

EBSCO PDA Program

Previous ed. by Jayson E. Street.

Includes bibliographical references and index.

H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network -- Part 1: F0RB1DD3N -- PR010GU3 -- Chapter 0N3 -- Chapter TW0 -- Chapter THR33 -- Chapter F0UR -- Chapter F1V3 -- Chapter S1X -- Chapter S3V3N -- Chapter E1GHT -- Chapter N1N3 -- Chapter T3N -- 3P1L0GU3 -- Part 2: Security threats are real (STAR) 2.0: Chapter 1. Recon -- Chapter 2. Scan -- Chapter 3. Explore -- Chapter 4. Exploit -- Chapter 5. Expunge -- Chapter 6. Hacker Culture -- Chapter 7. Bit Bucket.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum .

Description based on print version record.

There are no comments on this title.

to post a comment.

Powered by Koha