The book is not there to guide you about the installation, configuration, updating, troubleshooting, and defending book. It is not like other books about hacking. Then the question is what kind of this book is? There are a series of science fiction short stories in it about unauthorized access to someone else equipment and information or Refusing to use these resources to connect with those who want to access them. The book wrote in the conversation style. A series of 25 – 30 page chapters are written from the attacker's perspective who wants to access someone else system.
Authors of Book
- Dan Kaminsky (Effugas) Senior Security Consultant
- FX Security Solution Consultant
- Mark Burnett Independent Security Consultant
- Joe Grand CEO at Grand Idea Studio
- Ido Dubrawsky Network Security Architect
- Paul Pfeil Senior Security Consultant
- Timothy Mullen CIO & Chief Software Architect
Chapter index
- Chapter 1 – Hide and Sneak (Ido)
- Chapter 2 – The Worm Turns (Rayan & Tim)
- Chapter 3 – Just Another Day at the Office (Joe)
- Chapter 4 – h3X’s Adventures in network land (FX)
- Chapter 5 – The Thief no one saw (Paul)
- Chapter 6 – Flying the Friendly skies (Joe)
- Chapter 7 – dis-card (Mark)
- Chapter 8 – Social (In) Security (Ken)
- Chapter 9 – BabelNet (Dan)
- Chapter 10 – The Art of tracking (Mark)
No comments:
Post a Comment