Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dissecting the Hack: The V3rb0t3n Network

Buy

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation.

The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest.

"The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"―references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

  • All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin
  • Uses actual hacking and security tools in its story – helps to familiarize readers with the many devices and their code
  • Features cool new hacks and social engineering techniques, in real life context for ease of learning
(HTML tags aren't allowed.)

Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work
Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work

What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In this handbook, data expert Q. Ethan McCallum has gathered 19 colleagues from every corner of the data arena to reveal how they’ve recovered from nasty data problems.

From...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
How to Cheat at IIS 7 Server Administration
How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of...

Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)
Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)

The Shelly Cashnian Series® offers the finest textbooks in computer education-This .Microsoft Visual Basic 2010 book utilizes an innovative step-bv-step pedagogy,  which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

Getting a Business Loan: Financing Your Main Street Business
Getting a Business Loan: Financing Your Main Street Business

Every day,  Main Street businesses wrestle with the challenge of finding the cash to finance growth or use as working capital. The local banker often wants a credit score of 720, three or more years in business, and a fat savings account. No wonder local bankers approve only 10% of loan applications.

Getting a
...

Leadership Growth Through Crisis: An Investigation of Leader Development During Tumultuous Circumstances (Christian Faith Perspectives in Leadership and Business)
Leadership Growth Through Crisis: An Investigation of Leader Development During Tumultuous Circumstances (Christian Faith Perspectives in Leadership and Business)
This edited collection uses a biblical lens to explore how to lead effectively and grow in a crisis situation. The chapters examine topics such as communicating through crisis, developing organizations and leaders through crisis, personal crisis and leadership development, and ethics and morality in crisis. Case studies include David's...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy