Skip to content

Dissecting the Hack: the F0rb1dd3n Network, Revised Edition

Best in textbook rentals since 2012!

ISBN-10: 1597495689

ISBN-13: 9781597495684

Edition: 2010 (Revised)

Authors: Brian Baskin, Marcus J. Carey, Jayson E. Street, Kent Nabors

List price: $23.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $23.99
Copyright year: 2010
Publisher: Elsevier Science & Technology Books
Publication date: 8/6/2010
Binding: Paperback
Pages: 360
Size: 6.13" wide x 9.21" long x 1.00" tall
Weight: 1.584
Language: English

Joshua Brashars is a Technical Consultant based in San Diego, CA. His primary interests in technology focus around security, with a major emphasis on wireless and Voice over IP technology.

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA. At the request of the FBI, he was a guest speaker at…    

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent's background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

Forbidden
Prologue
Epilogue
Security Threats Are Real (STAR) 2.0
Recon
Scan
Explore
Exploit
Expunge
Hacker Culture
Bit Bucket