Dissecting the hack the forb1dd3n network /

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, e...

Full description

Other Authors: Street, Jayson E., ScienceDirect (Online service)
Format: eBook
Language: English
Published: Amsterdam ; Boston : Syngress, [2010]
Physical Description: 1 online resource (xx, 333 pages) : illustrations.
Edition: Rev. ed.
Subjects:
LEADER 05741cam a2200889Ia 4500
001 652758791
003 OCoLC
005 20180526100034.4
006 m o d
007 cr cn|||||||||
008 100805s2010 ne a ob 001 0 eng d
010 |z 2010019906 
019 |a 680617182  |a 688501549  |a 712992479  |a 769365811 
020 |a 9781597495691  |q (electronic bk.) 
020 |a 1597495697  |q (electronic bk.) 
020 |z 9781597495684 
020 |z 1597495689 
035 |a (OCoLC)652758791  |z (OCoLC)680617182  |z (OCoLC)688501549  |z (OCoLC)712992479  |z (OCoLC)769365811 
037 |a 1098297:10925851  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a E573BF1A-E83C-4B57-A156-C412BE1DCBCB  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d N$T  |d IUL  |d EBLCP  |d E7B  |d YDXCP  |d MHW  |d OCLCQ  |d TEFOD  |d REDDC  |d OCLCQ  |d OCLCF  |d OCLCA  |d OCLCQ  |d DKDLA  |d TFWBL  |d OCL  |d DEBSZ  |d TEFOD  |d OCLCQ  |d COO  |d OCLCQ  |d CNNOR  |d MERUC  |d OCLCA 
049 |a COM6 
050 4 |a HV8079.C65  |b S856 2010b 
072 7 |a TRU  |x 005000  |2 bisacsh 
082 0 4 |a 364.16/8  |2 22 
245 0 0 |a Dissecting the hack :  |b the forb1dd3n network /  |c Jayson E. Street [and others]. 
250 |a Rev. ed. 
264 1 |a Amsterdam ;  |a Boston :  |b Syngress,  |c [2010] 
264 4 |c ©2010. 
300 |a 1 online resource (xx, 333 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
520 |a Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; CHAPTER 2. Scan; CHAPTER 3. Explore; CHAPTER 4. Exploit; CHAPTER 5. Expunge; CHAPTER 6. Hacker Culture; CHAPTER 7. Bit Bucket; Index. 
588 0 |a Print version record. 
590 |a Elsevier  |b ScienceDirect All Books. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer crimes  |v Case studies. 
650 0 |a Hackers. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 7 |a TRUE CRIME  |x White Collar Crime.  |2 bisacsh. 
650 7 |a Computer crimes.  |2 fast. 
650 7 |a Computer crimes  |x Investigation.  |2 fast. 
650 7 |a Hackers.  |2 fast. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
655 4 |a Electronic books. 
655 7 |a Case studies.  |2 fast. 
655 7 |a Case studies.  |2 lcgft. 
700 1 |a Street, Jayson E. 
700 1 |a Street, Jayson E.  |t Dissecting the hack. 
710 2 |a ScienceDirect (Online service) 
776 0 8 |i Print version:  |t Dissecting the hack.  |b Rev. ed.  |d Amsterdam ; Boston : Syngress, ©2010  |z 9781597495684  |z 1597495689  |w (DLC) 2010019906  |w (OCoLC)477275252. 
907 |a .b49815787  |b multi  |c -  |d 160302  |e 230104 
998 |a cue  |a cu  |b 180626  |c m  |d z   |e -  |f eng  |g ne   |h 0  |i 2 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2018.03 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.03 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.netlib2 in 2016 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 180626  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Elsevier  |1 .i119624680  |u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9781597495684  |3 Elsevier  |z Click here for access