Dissecting the Hack

The V3rb0t3n Network

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Dissecting the Hack by Jayson E Street, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jayson E Street ISBN: 9780128042823
Publisher: Elsevier Science Publication: July 20, 2015
Imprint: Syngress Language: English
Author: Jayson E Street
ISBN: 9780128042823
Publisher: Elsevier Science
Publication: July 20, 2015
Imprint: Syngress
Language: English

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.

The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.

"The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

  • All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin
  • Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code
  • Features cool new hacks and social engineering techniques, in real life context for ease of learning
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.

The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.

"The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

More books from Elsevier Science

Cover of the book Energy, Sustainability and the Environment by Jayson E Street
Cover of the book Laser Growth and Processing of Photonic Devices by Jayson E Street
Cover of the book Safety Theory and Control Technology of High-Speed Train Operation by Jayson E Street
Cover of the book Breakthrough Food Product Innovation Through Emotions Research by Jayson E Street
Cover of the book Stability of Happiness by Jayson E Street
Cover of the book Advances in Agronomy by Jayson E Street
Cover of the book Mesoscale Modeling in Chemical Engineering Part II by Jayson E Street
Cover of the book Transboundary Water Resources in Afghanistan by Jayson E Street
Cover of the book Marschner's Mineral Nutrition of Higher Plants by Jayson E Street
Cover of the book Hydrophile - Lipophile Balance of Surfactants and Solid Particles by Jayson E Street
Cover of the book An Introduction to Ethical, Safety and Intellectual Property Rights Issues in Biotechnology by Jayson E Street
Cover of the book Advances in Clinical Chemistry by Jayson E Street
Cover of the book Introduction to Geophysical Fluid Dynamics by Jayson E Street
Cover of the book Advances in Insect Physiology by Jayson E Street
Cover of the book Leucocyte Adhesion by Jayson E Street
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy