The Resource Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]
Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]
Resource Information
The item Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others] represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others] represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page
- Language
- eng
- Edition
- Rev. ed.
- Extent
- 1 online resource (xx, 333 pages)
- Contents
-
- Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; CHAPTER 2. Scan; CHAPTER 3. Explore; CHAPTER 4. Exploit; CHAPTER 5. Expunge; CHAPTER 6. Hacker Culture; CHAPTER 7. Bit Bucket; Index
- Isbn
- 9781597495684
- Label
- Dissecting the hack : the f0rb1dd3n network
- Title
- Dissecting the hack
- Title remainder
- the f0rb1dd3n network
- Statement of responsibility
- Jayson E. Street [and others]
- Title variation
- Forbidden network
- Subject
-
- Hackers
- Case studies
- Computer crimes
- Computer crimes -- Case studies
- Computer crimes -- Case studies
- Computer crimes -- Investigation
- Computer crimes -- Investigation
- Computer crimes -- Investigation
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computer security
- Hackers
- Language
- eng
- Summary
- "Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story."--Resource description page
- Cataloging source
- UMI
- Dewey number
- 364.16/8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- HV8079.C65
- LC item number
- S856 2010
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Street, Jayson E
- Street, Jayson E
- http://library.link/vocab/subjectName
-
- Computer crimes
- Computer crimes
- Hackers
- Computer networks
- Computer security
- Computer crimes
- Computer crimes
- Computer hackers
- Computer networks
- Computer security
- Computer crimes
- Computer crimes
- Hackers
- Computer networks
- Computer security
- Label
- Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; CHAPTER 2. Scan; CHAPTER 3. Explore; CHAPTER 4. Exploit; CHAPTER 5. Expunge; CHAPTER 6. Hacker Culture; CHAPTER 7. Bit Bucket; Index
- Control code
- 701106275
- Dimensions
- unknown
- Edition
- Rev. ed.
- Extent
- 1 online resource (xx, 333 pages)
- Form of item
- online
- Isbn
- 9781597495684
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000083
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)701106275
- Label
- Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; CHAPTER 0N3; CHAPTER TW0; CHAPTER THR33; CHAPTER F0UR; CHAPTER F1V3; CHAPTER S1X; CHAPTER S3V3N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; CHAPTER 2. Scan; CHAPTER 3. Explore; CHAPTER 4. Exploit; CHAPTER 5. Expunge; CHAPTER 6. Hacker Culture; CHAPTER 7. Bit Bucket; Index
- Control code
- 701106275
- Dimensions
- unknown
- Edition
- Rev. ed.
- Extent
- 1 online resource (xx, 333 pages)
- Form of item
- online
- Isbn
- 9781597495684
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- cl0500000083
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)701106275
Subject
- Hackers
- Case studies
- Computer crimes
- Computer crimes -- Case studies
- Computer crimes -- Case studies
- Computer crimes -- Investigation
- Computer crimes -- Investigation
- Computer crimes -- Investigation
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computer security
- Hackers
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Dissecting-the-hack--the-f0rb1dd3n-network/vq-55ONjeYA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Dissecting-the-hack--the-f0rb1dd3n-network/vq-55ONjeYA/">Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Dissecting-the-hack--the-f0rb1dd3n-network/vq-55ONjeYA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Dissecting-the-hack--the-f0rb1dd3n-network/vq-55ONjeYA/">Dissecting the hack : the f0rb1dd3n network, Jayson E. Street [and others]</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>