Dissecting the Hack

Dissecting the Hack

4.11 - 1251 ratings - Source

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled qThe V3rb0t3n Network, q continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, qSecurity Threats Are Realq (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. qThe V3rb0t3n Networkq can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout qThe V3rb0t3n Networkq are qEaster eggsqa€”references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on qThe V3rb0t3n Network, q STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attackera€™s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attackera€™s presence on a computer system; and the underlying hacking culture. All new volume of Dissecting the Hack by Jayson Street, with technical edit by Brian Martin Uses actual hacking and security tools in its story a€“ helps to familiarize readers with the many devices and their code Features cool new hacks and social engineering techniques, in real life context for ease of learningIn one incident in 2014 a Bitcoin entrepreneur lost nearly all of his Bitcoin cache, totaling nearly $280, 000 USD. ... while the victim was connected to a public WiFi hotspot during a vacation in Bali, 37 where his MacBook Pro was vulnerable toanbsp;...

Title:Dissecting the Hack
Author:Jayson E Street
Publisher:Syngress - 2015-07-20


You Must CONTINUE and create a free account to access unlimited downloads & streaming