• List Price: $29.95
  • Save: $17.06 (57%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: Jan 24, 2015
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
FREE Shipping on orders over $35.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Qty:1
  • List Price: $29.95
  • Save: $9.35 (31%)
FREE Shipping on orders over $35.
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Dissecting the Hack: The ... has been added to your Cart
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition Paperback – July 15, 2010

ISBN-13: 978-1597495684 ISBN-10: 1597495689 Edition: 1st

Buy New
Price: $20.60
Rent
Price: $12.89
32 New from $9.57 19 Used from $9.04
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$7.83
Paperback
"Please retry"
$20.60
$9.57 $9.04
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

$20.60 FREE Shipping on orders over $35. Only 7 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Price for all three: $51.53

Buy the selected items together

NO_CONTENT_IN_FEATURE
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 360 pages
  • Publisher: Syngress; 1 edition (July 15, 2010)
  • Language: English
  • ISBN-10: 1597495689
  • ISBN-13: 978-1597495684
  • Product Dimensions: 1 x 7.8 x 9.5 inches
  • Shipping Weight: 1.7 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (16 customer reviews)
  • Amazon Best Sellers Rank: #672,144 in Books (See Top 100 in Books)

Editorial Reviews

Review

"Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc. "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute

About the Author

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA.

At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent's background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

Brian Baskin is a digital forensics professional employed by CSC and serves as the Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA), part of the Department of Defense Cyber Crime Center (DC3). For more than 10 years, Brian has worked with the DCITA to research, develop, and teach forensic responses to growing cyber threats. Brian devotes much of his time to researching the evolving Internet crimes, network protocol analysis, and Linux and UNIX intrusion responses.
Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices.
Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).

Marcus J. Carey is well known for being a compulsive mentor in the information security community. Marcus has more than 17 years of experience in the information security field, working in the military, federal, and private sectors. Marcus served more than 8 years active duty in the U.S. Navy Cryptologic Security Group. Marcus ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended the Department of Defense's secure networks. Marcus earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.6 out of 5 stars
5 star
10
4 star
5
3 star
1
2 star
0
1 star
0
See all 16 customer reviews
So, as soon as I could, I picked up the book.
Rich
If you enjoy books on hacking but are looking for something that shows how some of the tools are used or at least what they are used for this is the book to get.
Trebin
I enjoyed the story it was a quick and easy read that seem to have a lot of information.
Marian Kersh

Most Helpful Customer Reviews

11 of 12 people found the following review helpful By K0nsp1racy on February 2, 2011
Format: Kindle Edition Verified Purchase
It is apparent to me that Jayson Street is passionate about information security, and also that he can present and captivate an audience through his perspectives. His ability to tell the story of Bob and Leon suddenly thrust in a situation that is larger than they could imagine was very entertaining. Although I do not think the storytelling is perfect, the plot and transitions in Part 1 of the story are not difficult to follow. I also found that the STAR section was very educational, finding several sources and perspectives that I had not found in my own explorations. Overall, I found the book to be a very compelling read and I place this book in the same category as Cliff Stoll's The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage and Russ Rogers' Hacking a Terror Network: The Silent Threat of Covert Channels.

On the downside, I think my experience would have been more complete if I had read the paperback version of the book, as the Kindle edition seemed to reference physical page numbers that do not exist in the Kindle version (Kindle uses location IDs). Despite the Kindle limitation, the book was nevertheless very enjoyable.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By Amazon Customer on February 18, 2011
Format: Paperback Verified Purchase
I purchased the revised edition of Dissecting the Hack: The F0rb1dd3n Network, a few months ago and was forced to put it down (just no time to read) about 1/4 of the way in. I recently picked it back up started over and couldn't read part 1 quickly enough.

Part 1 instantly drew me into the story within the first few pages, the story gets off to an amazing start and I found myself sneaking in as much reading as I could. I HAD to know what was going to happen next. Many of the techniques and methods were familiar to me, which put me that much closer to the story. I felt I could easily relate and simply couldn't wait until the next "hack" was performed.

I really liked the STAR section (Part 2) as well, mainly because if there was something I was unfamiliar with I could just look it up right there in the same book. The inclusion of this section AND the ability to treat it either as a stand alone reference OR an integrated part of the story was an excellent idea.

I plan on reading it again but starting with part 2 and looking back at the references of the story. AND looking for more easter eggs.

This book is also approachable from the standpoint of handing it to a manager, parent, or anyone else who may understand how to use computers as an interface to check their email and consider all this "hacking" to be black magic. I think it does a wonderful job of outlining the attacks so they are understood and easily digested.

I can not recommend this book highly enough.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By J. M. Garcia on November 29, 2010
Format: Paperback Verified Purchase
The book is simply amazing not only is the information presented in the second portion of the book useful but the story in the first portion of the book made me finish it within 2 days. A must read!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Charles Profitt on November 7, 2010
Format: Paperback
This book is an excellent piece of fiction about a part of the digital world most wish to keep their eyes closed too. While there were a few 'plot holes', they were not serious enough to detract from the enjoyment of the story.

As a computer professional none of the 'tools' or 'techniques' were new to me, but the author put them together in a way that showed how one small 'slip' can lead to larger issues. If you are a computer professional it would be well worth buying this book and after you are done reading it hand it off to some of your non-technical co-workers. Just imagine the horror in their eyes when they joke with you about how unrealistic the book is and you have to tell them that all of the tools and techniques are 100% real and available.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Mary Ellen Ide on December 1, 2010
Format: Paperback Verified Purchase
The only reason I didn't give this book 5 stars is because Ninja Hacking (also by Syngress) is one of the best pentesting books out there and although this book is excellent, it isn't as good at Ninja Hacking.
Things I like about this book:
-the stories are realistic, and do a great job at showing the reader why vulnerabilities can be so dangerous, and how they are used in the real world by attackers to do malicious things
-the tech part is great and full of UP TO DATE (very impt!) resources at the end of each chapter
-the last 2 chapters- interviews with well knowns in the security world, are chock full of links to blogs, conferences, other urls that are UP TO DATE!! i uncovered great resources that i didn't know existed! (and i had a huge list already)

All in all, this is a great book, highly recommended and I would have given it 4 and a half stars if I could.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Nathan Drennan on January 4, 2013
Format: Paperback Verified Purchase
Having read lots of sci-fi and tech thrillers the story line of this book is really appealing to me. The fact that the attacks and technology in the book are all real makes it that much more exciting, and as informative as textbooks on the topic.

InfoSec students should be required to read this book and I'm sure professionals in the field will love it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Marian Kersh on December 18, 2010
Format: Paperback
As someone who was given the book to read I found it an eye opener. It has made me more aware why I have to make sure my home network is secure and why the many passwords I have at work are necessary. I enjoyed the story it was a quick and easy read that seem to have a lot of information. I liked the fact that the technical stuff was referenced and not explained during the story. As a not technical person I was able to look up only what I thought was relevant to me.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?