Franklin

Dissecting the hack [electronic resource] : the FOrb1dd3n network / Jayson E. Street ... [et al.].

Author/Creator:
Street, Jayson E.
Publication:
Amsterdam ; Boston : Elsevier / Syngress, c2010.
Format/Description:
Book
1 online resource (355 p.)
Edition:
Rev. ed.
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Other Title:
Dissecting the hack : the forbidden network
Subjects:
Computer crimes -- Investigation.
Computer crimes -- Case studies.
Computer hackers.
Computer networks -- Security measures.
Computer security.
Form/Genre:
Electronic books.
Language:
English
System Details:
text file
Summary:
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughou
Contents:
Front Cover; Half Title Page; Title Page; Copyright Page; Dedication; Table of Contents; Foreword; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR010GU3; A New Assignment; CHAPTER 0N3; Problem Solved; Getting Started; The Acquisition; CHAPTER TW0; Just Another Day; The Installation; CHAPTER THR33; In Country; CHAPTER F0UR; In Real Life; CHAPTER F1V3; Status Check; Log Review; CHAPTER S1X; The Meeting; First Lead; The Discovery; CHAPTER S3V3N; Code Review; CHAPTER E1GHT; Battle Plans; Data Collection; CHAPTER N1N3; Data Analysis
Shrinking TeamTenuous Connections; Loose Ends; Expendable Assets; CHAPTER T3N; Choosing Sides; 3P1L0GU3; End Process; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0; CHAPTER 1. Recon; Social Networking; Exploit Techniques; Best Practices; Summary of Social Networking; For More Information; Google Hacking; Exploit Techniques; Best Practices; Summary of Google Hacking; For More Information; Deep Web Searching; Exploit Techniques; Best Practices; Summary of Deep Web Searching; For More Information; Physical Surveillance; Exploit Techniques; Best Practices; Summary of Physical Surveillance
For More InformationLog Analysis; Exploit Techniques; Best Practices; Summary of Log Analysis; For More Information; Do It Yourself: Hacking 3DNF; Targeting Human Resources; Google Apps; Blog Recon; Domain Information; Twitter Recon; Endnotes; CHAPTER 2. Scan; Wardriving; Exploit Techniques; Best Practices; Summary of Wardriving; For More Information; Long-Range Wireless Scanning; Exploit Techniques; Best Practices; Summary of Long-Range Wireless Scanning; For More Information; Scanning Tools; Exploit Techniques; Best Practices; Summary of Scanning Tools; For More Information
Bluetooth SecurityExploit Techniques; Best Practices; Summary of Bluetooth Security; For More Information; Endnotes; CHAPTER 3. Explore; Authentication Security; Exploit Techniques; Best Practices; Summary of Authentication Security; For More Information; Physical Security; Exploit Techniques; Best Practices; Summary of Physical Security; For More Information; Network Traffic Sniffing; Exploit Techniques; Best Practices; Summary of Network Traffic Sniffing; For More Information; Dormant Malware; Exploit Techniques; Best Practices; Summary of Dormant Malware; For More Information
Web Browser SecurityExploit Techniques; Best Practices; Summary of Web Browser Security; For More Information; Out-of-Band Communications; Exploit Techniques; Best Practices; Summary of Out-of-Band Communications; For More Information; Endnotes; CHAPTER 4. Exploit; Encrypted Storage; Exploit Techniques; Best Practices; Summary of Encrypted Storage; For More Information; Attack Research; Exploit Techniques; Best Practices; Summary of Attack Research; For More Information; Password Security; Exploit Techniques; Best Practices; Summary of Password Security; For More Information; E-Mail Security
Exploit Techniques
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
Contributor:
Street, Jayson E.
Street, Jayson E.
ISBN:
1-282-70022-7
9786612700224
1-59749-569-7
OCLC:
652758791