04917nam 2200745 450 991079748580332120200520144314.00-12-804282-6(CKB)3710000000448993(EBL)2098440(SSID)ssj0001561958(PQKBManifestationID)16204694(PQKBTitleCode)TC0001561958(PQKBWorkID)14833321(PQKB)10374193(Au-PeEL)EBL2098440(CaPaEBR)ebr11080521(CaONFJC)MIL822747(OCoLC)914301019(CaSebORM)9780128042823(MiAaPQ)EBC2098440(PPN)198685548(EXLCZ)99371000000044899320150730h20152015 uy 0engur|n|---|||||txtccrDissecting the hack the V3rb0ten network /Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others]1st editionAmsterdam, Netherlands :Syngress,2015.©20151 online resource (306 p.)Description based upon print version of record.0-12-804278-8 Includes bibliographical references.Front Cover; Dissecting the Hack; Copyright Page; Dedication; Contents; List of Contributors; About the Authors; Foreword; Acknowledgments; About the Book; 1 The V3rb0t3n Network; Prologue; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Epilogue; 2 Interview Interlude; Adam Laurie Co-Founder and Director of Aperture Labs Ltd.; Thomas Lim Founder and CEO of COSEINC; Josh Thomas Chief Breaker & Partner at Atredis Partners; 3 Star; Radio Frequency Identification (RFID); BitCoin and Digital Currency; SteganographySSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSECPentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 MeetingsDissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network,"" continues the ficComputer crimesCase studiesComputer crimesInvestigationComputer networksSecurity measuresComputer securityHackersComputer crimesComputer crimesInvestigation.Computer networksSecurity measures.Computer security.Hackers.364.168Street Jayson E.1544801Sims KristinBaskin BrianMartin BrianJordan BrittneyMiAaPQMiAaPQMiAaPQBOOK9910797485803321Dissecting the hack3799299UNINA