0
Your cart

Your cart is empty

Books > Computing & IT > Computer programming

Buy Now

Dissecting the Hack - The V3rb0t3n Network (Paperback) Loot Price: R853
Discovery Miles 8 530
Dissecting the Hack - The V3rb0t3n Network (Paperback): Jayson E. Street

Dissecting the Hack - The V3rb0t3n Network (Paperback)

Jayson E. Street

 (sign in to rate)
Loot Price R853 Discovery Miles 8 530 | Repayment Terms: R80 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: July 2015
Authors: Jayson E. Street
Dimensions: 235 x 190 x 12mm (L x W x T)
Format: Paperback
Pages: 211
ISBN-13: 978-0-12-804278-6
Categories: Books > Computing & IT > Computer programming > General
Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 0-12-804278-8
Barcode: 9780128042786

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Problem Solving with C++ - Global…
Walter Savitch Paperback R2,189 R1,762 Discovery Miles 17 620
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, … Paperback  (1)
R785 Discovery Miles 7 850
Programming Logic & Design
Joyce Farrell Paperback R757 Discovery Miles 7 570
C++ Programming - Program Design…
D. Malik Paperback R1,646 R1,523 Discovery Miles 15 230
Program Construction - Calculating…
Roland Backhouse Paperback R2,460 Discovery Miles 24 600
Introduction to Python Programming and…
B. Harwani Paperback  (2)
R935 Discovery Miles 9 350
Programming Logic & Design…
Joyce Farrell Paperback R1,256 R1,170 Discovery Miles 11 700
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka Hardcover R3,950 Discovery Miles 39 500
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R3,940 Discovery Miles 39 400
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid Paperback R1,332 Discovery Miles 13 320

See more

Partners