Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition 1st Edition

4.5 out of 5 stars 19 customer reviews
ISBN-13: 978-1597495684
ISBN-10: 1597495689
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$5.25 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$19.41 On clicking this link, a new layer will be open
More Buying Choices
26 New from $12.99 22 Used from $5.25
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Excel2016ForDummiesVideo
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
$19.41 FREE Shipping on orders with at least $25 of books. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
  • +
  • Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats
Total price: $72.29
Buy the selected items together

Editorial Reviews

Review

"The descriptions will be useful for nonsecurity professionals to understand the security jargon in the story and in real life."--Computing Reviews, Dissecting the Hack

"Welcome to hacker fiction―like sci fi, but you don't get to make the good stuff up."―Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."―FX of Phenoelit Recurity Labs GmbH"A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."―Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc. "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."―Stephen Northcutt, President, The SANS Technology Institute

About the Author

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA.

At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent’s background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

Brian Baskin is a digital forensics professional employed by CSC and serves as the Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA), part of the Department of Defense Cyber Crime Center (DC3). For more than 10 years, Brian has worked with the DCITA to research, develop, and teach forensic responses to growing cyber threats. Brian devotes much of his time to researching the evolving Internet crimes, network protocol analysis, and Linux and UNIX intrusion responses.
Brian also serves as a technical reviewer for DCITA. He helps to analyze content and procedures for more than two dozen cyber security courses for technical validity and relevance. For fun, he manages a content creation team that develops online Web-based incident response training that provides hands-on experience to military units stationed overseas. His team works with the various federal and military law enforcement groups for information sharing and collaboration on ongoing threats and best practices.
Brian has also served as a subject matter expert for content development for the National White Collar Crime Center (NW3C) and the Federal Law Enforcement Training Center (FLETC).

Marcus J. Carey is well known for being a compulsive mentor in the information security community. Marcus has more than 17 years of experience in the information security field, working in the military, federal, and private sectors. Marcus served more than 8 years active duty in the U.S. Navy Cryptologic Security Group. Marcus ended his naval service by being assigned to the National Security Agency (NSA) where he engineered, monitored, and defended the Department of Defense's secure networks. Marcus earned a Master of Science in Network Security from Capitol College in Laurel, Maryland.
NO_CONTENT_IN_FEATURE
The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 360 pages
  • Publisher: Syngress; 1 edition (July 15, 2010)
  • Language: English
  • ISBN-10: 1597495689
  • ISBN-13: 978-1597495684
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.7 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (19 customer reviews)
  • Amazon Best Sellers Rank: #514,450 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Kindle Edition Verified Purchase
It is apparent to me that Jayson Street is passionate about information security, and also that he can present and captivate an audience through his perspectives. His ability to tell the story of Bob and Leon suddenly thrust in a situation that is larger than they could imagine was very entertaining. Although I do not think the storytelling is perfect, the plot and transitions in Part 1 of the story are not difficult to follow. I also found that the STAR section was very educational, finding several sources and perspectives that I had not found in my own explorations. Overall, I found the book to be a very compelling read and I place this book in the same category as Cliff Stoll's The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage and Russ Rogers' Hacking a Terror Network: The Silent Threat of Covert Channels.

On the downside, I think my experience would have been more complete if I had read the paperback version of the book, as the Kindle edition seemed to reference physical page numbers that do not exist in the Kindle version (Kindle uses location IDs). Despite the Kindle limitation, the book was nevertheless very enjoyable.
Comment 12 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I purchased the revised edition of Dissecting the Hack: The F0rb1dd3n Network, a few months ago and was forced to put it down (just no time to read) about 1/4 of the way in. I recently picked it back up started over and couldn't read part 1 quickly enough.

Part 1 instantly drew me into the story within the first few pages, the story gets off to an amazing start and I found myself sneaking in as much reading as I could. I HAD to know what was going to happen next. Many of the techniques and methods were familiar to me, which put me that much closer to the story. I felt I could easily relate and simply couldn't wait until the next "hack" was performed.

I really liked the STAR section (Part 2) as well, mainly because if there was something I was unfamiliar with I could just look it up right there in the same book. The inclusion of this section AND the ability to treat it either as a stand alone reference OR an integrated part of the story was an excellent idea.

I plan on reading it again but starting with part 2 and looking back at the references of the story. AND looking for more easter eggs.

This book is also approachable from the standpoint of handing it to a manager, parent, or anyone else who may understand how to use computers as an interface to check their email and consider all this "hacking" to be black magic. I think it does a wonderful job of outlining the attacks so they are understood and easily digested.

I can not recommend this book highly enough.
Comment 8 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I've been so busy reading technical manuals that this was a great change of pace. Combines a fun crime thriller story with the details on the tools and processes the hackers used and how to defend against them.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
My first time reviewing this book, I gave it three stars. Actually, I thought it wasn't worth it. But, now that I actually finished reading part 1 completely, I give it five stars. Personally, I want to get in contact with the authors and beg them to film a real movie based upon the book. I got so into the story, i would love to bring it more to life by watching a movie on the same story!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By mgonda on April 19, 2011
Format: Paperback Verified Purchase
I personally have never seen a book like this one. I think it has created a genre of its own, and I liked it. I hope that other authors might be able to build off this real life hacking, explanatory fiction. The story kept my attention, and the only con I can think of is that I just wished it was a little longer. I have already recommended this book to friends of mine, and they're planning on reading it too.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Having read lots of sci-fi and tech thrillers the story line of this book is really appealing to me. The fact that the attacks and technology in the book are all real makes it that much more exciting, and as informative as textbooks on the topic.

InfoSec students should be required to read this book and I'm sure professionals in the field will love it.
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
The book is simply amazing not only is the information presented in the second portion of the book useful but the story in the first portion of the book made me finish it within 2 days. A must read!
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Ever since I first saw Jayson Street speak I was hooked. The man is brilliant and, importantly, very modest and down to earth. So, as soon as I could, I picked up the book.

Let me tell you, it's amazing. The fiction at the beginning reads like a true page turner and manages to "dumb down" many concepts to a level Joe Sixpack can understand. It's a very engaging story, and the ending makes you want more.

STAR, which is what many of you will buy the book for, walks you through many of the attack vectors and methods that hackers will use against your business. As the foreword says, this is a new method to get through to people about the importance of security.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition