Dissecting the Hack: The F0rb1dd3n Network

Overview

Dissecting the Hack is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.

Yes, the security threats are real - read more about the tactics that you see executed ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (5) from $29.50   
  • New (1) from $215.00   
  • Used (4) from $29.50   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$215.00
Seller since 2015

Feedback rating:

(214)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Dissecting the Hack is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.

Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!



  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
  • Introduces basic hacking techniques in real life context for ease of learning
  • Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack
Read More Show Less

What People Are Saying


"Welcome to hacker fiction -- like SciFi, but you don't get to make the good stuff up."
—Dan Kaminsky, Director of Penetration testing IOActive, Inc. IOActive

"There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."
—FX of Phenoelit Recurity Labs GmbH

"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."
—Johnny Long, Professional hacker, best-selling author and founder of Hackers For Charity, Inc. HFC

"'Dissecting the Hack: the F0rb1dd3n Network' is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."
—Stephen Northcutt, President, The SANS Technology Institute SANS
Read More Show Less

Product Details

  • ISBN-13: 9781597494786
  • Publisher: Syngress Publishing
  • Publication date: 9/17/2009
  • Pages: 440
  • Product dimensions: 7.50 (w) x 9.20 (h) x 1.00 (d)

Meet the Author

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA. At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent's background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University ofOklahoma.

Dustin L. Fritz [BSISS; E|CSA] is owner and Chief Executive Officer of The Computer Network Defense Group LLC in Owings Mills, Maryland providing executive-level strategic and tactical cybersecurity consulting services. He specializes in Information Operations Conditions, Information Assurance Vulnerability Management, risk and vulnerability assessments, certification-n-accreditation, security awareness and planning, configuration management, and incident response team development. Dustin has over 10 years of Information Assurance and Computer Network Defense (CND) experience, with core foundations in creating enterprise-wide CND strategies for the Department of the Navy, realigning incident response throughout the United States Pacific Fleet, and implementing the first-ever Information Operations Condition response team (IRT). Dustin's contributions and outstanding achievements in cybersecurity have been consistently recognized over the years by the United States Navy and the Secretary of the Navy; most recently in November 2007 for his actions in attaining 100 percent readiness for all Forward Deployed Naval Forces. Dustin holds a Bachelor of Science in Information Systems Security (BSISS) from Westwood College out of Denver, Colorado and is a EC-Council | Certified Security Analyst (E|CSA). He is an active member of Institute of Electrical and Electronics Engineers, Association of Information Technology Professionals, the Cyber Warfare Forum Initiative and can always be found speaking in public about cybersecurity and providing professional mentoring. Along with being the technical editor for Dissecting the Hack: The Forbidden Network, Dustin has also contributed to Syngress' CompTIA Network+ Certification Study Guide (2009) (ISBN-10: 1597494291; ISBN-13: 978-1597494298) as a technical editor and author.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)