• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

ISBN-13: 9781597495684 / Angielski / Miękka / 2010 / 333 str.

Jayson Street
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition Jayson Street 9781597495684  - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

ISBN-13: 9781597495684 / Angielski / Miękka / 2010 / 333 str.

Jayson Street
cena 116,54
(netto: 110,99 VAT:  5%)

Najniższa cena z 30 dni: 115,83
Termin realizacji zamówienia:
ok. 30 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons. The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.

  • Revised edition includes a completely NEW STAR Section (Part 2)
  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
  • Introduces basic hacking techniques in real life context for ease of learning
  • Kategorie:
    Informatyka, Internet
    Kategorie BISAC:
    Computers > Computer Science
    Computers > Information Technology
    Computers > Networking - General
    Język:
    Angielski
    ISBN-13:
    9781597495684
    Rok wydania:
    2010
    Wydanie:
    Revised
    Ilość stron:
    333
    Waga:
    0.72 kg
    Wymiary:
    21.95 x 19.2 x 2.29
    Oprawa:
    Miękka
    Wolumenów:
    01
    Dodatkowe informacje:
    Bibliografia
    Wydanie ilustrowane

    "The descriptions will be useful for nonsecurity professionals to understand the security jargon in the story and in real life."--Computing Reviews, Dissecting the Hack

    "Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc. "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute

    Part 1: FOrb1dd3n
    PrO1Ogu3
    ON3
    TWO
    THR33
    FOUR
    F1V3
    S1X
    S3V3N
    E1GHT
    N1N3
    T3N
    3P1LOGU3

    PART 2: Security Threats Are Real (STAR) 2.0
    1: Recon
    2: Scan
    3: Explore
    4: Exploit
    5: Expunge
    6: Hacker Culture
    7: Bit Bucket

    Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA.

    At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

    Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent's background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma. Brian Baskin is a digital forensics professional employed by CSC and serves as the Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA), part of the Department of Defense Cyber Crime Center (DC3). For more than 10 years, Brian has worked with the DCITA to research, develop, and teach forensic responses to growing cyber threats. Brian devotes much of his time to researching the evolving Internet crimes, network protocol analysis, and Linux and UNIX intrusion responses.

    Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices.

    Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).

    Marcus J. Carey is well known for being a compulsive mentor in the information security community. Marcus has more than 17 years of experience in the information security field, working in the military, federal, and private sectors. Marcus served more than 8 years active duty in the U.S. Navy Cryptologic Security Group. Marcus ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended the Department of Defense's secure networks. Marcus earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.



    Udostępnij

    Facebook - konto krainaksiazek.pl



    Opinie o Krainaksiazek.pl na Opineo.pl

    Partner Mybenefit

    Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

    Czytaj nas na:

    Facebook - krainaksiazek.pl
    • książki na zamówienie
    • granty
    • książka na prezent
    • kontakt
    • pomoc
    • opinie
    • regulamin
    • polityka prywatności

    Zobacz:

    • Księgarnia czeska

    • Wydawnictwo Książkowe Klimaty

    1997-2025 DolnySlask.com Agencja Internetowa

    © 1997-2022 krainaksiazek.pl
         
    KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
    Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
    KrainaKsiazek.PL - Księgarnia Internetowa
    Polityka prywatnosci - link
    Krainaksiazek.pl - płatnośc Przelewy24
    Przechowalnia Przechowalnia