Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dissecting the Hack: The V3rb0t3n Network

Buy

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.

The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.

"The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"―references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

  • All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin
  • Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code
  • Features cool new hacks and social engineering techniques, in real life context for ease of learning
(HTML tags aren't allowed.)

Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that...

Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

From Idea to Web Start-up in 21 Days: Creating bacn.com (Voices That Matter)
From Idea to Web Start-up in 21 Days: Creating bacn.com (Voices That Matter)

Once upon a time, starting a business meant months of researching, refining business goals and writing business plans, talking to investors and banks, negotiating for loans, and raising money. But today, agile web development practices mean that you can almost launch on an idea and figure it out as you go. At least that’s what authors...


The Online Teaching Survival Guide: Simple and Practical Pedagogical Tips
The Online Teaching Survival Guide: Simple and Practical Pedagogical Tips

Essential reading for online instructors, updated to cover new and emerging issues and technologies

The Online Teaching Survival Guide provides a robust overview of theory-based techniques for teaching online or technology-enhanced courses. Covering all aspects of online teaching, this book reviews the latest research...

Microsoft Vista for IT Security Professionals
Microsoft Vista for IT Security Professionals
This book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing...
Semiconductor Optical Amplifiers
Semiconductor Optical Amplifiers

This invaluable book provides a comprehensive treatment of the design and applications of the semiconductor optical amplifier (SOA). SOAs are important components for optical communication systems with applications as in-line amplifiers and as functional devices in evolving optical networks. The functional applications of SOAs were first...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy