Dissecting the Hack: The F0rb1dd3n Network, Revised Edition and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
Trade in Yours
For a 0.25 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Dissecting the Hack on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition [Paperback]

Jayson Street
4.5 out of 5 stars  See all reviews (2 customer reviews)
RRP: 18.99
Price: 17.29 & FREE Delivery in the UK. Details
You Save: 1.70 (9%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Friday, 1 Aug.? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 16.43  
Paperback 17.29  
Trade In this Item for up to 0.25
Trade in Dissecting the Hack: The F0rb1dd3n Network, Revised Edition for an Amazon Gift Card of up to 0.25, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

19 Mar 2010

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life.

Yes, the security threats are real, and in this revised edition Part 2, this content completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story.

  • Revised edition includes a completely NEW STAR Section (Part 2)

  • Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code

  • Introduces basic hacking techniques in real life context for ease of learning

  • Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

  • Check out the companion site at www.dissectingthehack.com complete with an interactive forum!



Frequently Bought Together

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition + The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Buy the selected items together

Product details

  • Paperback: 416 pages
  • Publisher: Syngress; Revised edition edition (19 Mar 2010)
  • Language: English
  • ISBN-10: 1597495689
  • ISBN-13: 978-1597495684
  • Product Dimensions: 21.9 x 19.2 x 2.3 cm
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: 693,322 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Product Description


"Welcome to hacker fiction-like sci fi, but you don't get to make the good stuff up."-Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. "There have been many sensationalist books on hackers, and this isn't one of them. Get a feeling for what it's really about and follow through with the technical details. Fun like Star Trek, but comes with the blueprints."-FX of Phenoelit Recurity Labs GmbH "A great read, whether you're a geek or not. Hollywood should take notes...a gripping story centered around real tech."-Johnny Long, Professional Hacker, Best-Selling Author and Founder of Hackers For Charity, Inc. "Dissecting the Hack: the F0rb1dd3n Network is an educational thriller, the reader is thoroughly entertained and yet walks away with an understanding of the importance of information security theory and practice."-Stephen Northcutt, President, The SANS Technology Institute

About the Author

Jayson E. Street is the principle partner in Stratagem One Solutions, an Information Security and Penetration Testing consultancy (http://stratagem-one.com). Jayson has consulted with the FBI on attempted breaches of networks resulting in the capture and successful prosecution of the perpetrators. Jayson has also consulted with the Secret Service on wireless security and cyber crime investigations. Other projects have included conducting a three day training course on Intrusion Detection Systems for an undisclosed government agency in Washington D.C. He also created and taught a workshop on ethical pen-testing with Backtrack 3 for ISSA. At the request of the FBI, he was a guest speaker at the INFRAGARD 2004 wireless conference where he presented the current status of the hacking underground. In addition, he's addressed issues concerning wireless security and some solutions to secure it. In June of 2005 and July 2006 he discussed the challenges of educating upper management on the challenges of Information Security at The University of Advancing Technologies Tech Forum. And in 2008 he gave a presentation at the Cyber Crimes Alliance meeting at the invitation of the Secret Service.

Kent Nabors serves as Vice President of Information Security for a multi-billion dollar financial institution. He has significant experience in both the banking and IT industries. He has worked in bank examinations with the Federal Deposit Insurance Corporation and the Federal Reserve Bank. Kent's background includes security policy development, systems implementation, incident response, and training development. Kent received his Master of Business Administration from the University of Oklahoma.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

3 star
2 star
1 star
4.5 out of 5 stars
4.5 out of 5 stars
Most Helpful Customer Reviews
1 of 1 people found the following review helpful
4.0 out of 5 stars Worth buying 18 Nov 2011
By MrBob
The book is in two halves: a fictional action/thriller story about two hackers and some 'bad guys', and a technical look at the computer security techniques used in this fictional story.

The fiction half is a bit cheesy, but good enough that it kept me turning the pages. Technically, the book made a much better explanation of actual hacking techniques than any other book I've read which has been aimed at a layman. It doesn't try and be comprehensive, but it DOES offer complete explanations of a technique and gives good lists of (hacking) tools you can use.
If you are new to computer security testing, this is a good book to give you an idea of what it involves.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars very interesting 11 Feb 2013
By jsabina
Format:Paperback|Verified Purchase
I really like this book.
It gives interesting hints to learn more and easy to read if you know something about it
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.6 out of 5 stars  15 reviews
11 of 12 people found the following review helpful
5.0 out of 5 stars A Very Accurate and Interesting Story - Pure Edutainment! 3 Feb 2011
By K0nsp1racy - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
It is apparent to me that Jayson Street is passionate about information security, and also that he can present and captivate an audience through his perspectives. His ability to tell the story of Bob and Leon suddenly thrust in a situation that is larger than they could imagine was very entertaining. Although I do not think the storytelling is perfect, the plot and transitions in Part 1 of the story are not difficult to follow. I also found that the STAR section was very educational, finding several sources and perspectives that I had not found in my own explorations. Overall, I found the book to be a very compelling read and I place this book in the same category as Cliff Stoll's The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage and Russ Rogers' Hacking a Terror Network: The Silent Threat of Covert Channels.

On the downside, I think my experience would have been more complete if I had read the paperback version of the book, as the Kindle edition seemed to reference physical page numbers that do not exist in the Kindle version (Kindle uses location IDs). Despite the Kindle limitation, the book was nevertheless very enjoyable.
7 of 8 people found the following review helpful
5.0 out of 5 stars 7|-|1$ b00|< 1$ 100% \/\/1|\| 18 Feb 2011
By Amazon Customer - Published on Amazon.com
Format:Paperback|Verified Purchase
I purchased the revised edition of Dissecting the Hack: The F0rb1dd3n Network, a few months ago and was forced to put it down (just no time to read) about 1/4 of the way in. I recently picked it back up started over and couldn't read part 1 quickly enough.

Part 1 instantly drew me into the story within the first few pages, the story gets off to an amazing start and I found myself sneaking in as much reading as I could. I HAD to know what was going to happen next. Many of the techniques and methods were familiar to me, which put me that much closer to the story. I felt I could easily relate and simply couldn't wait until the next "hack" was performed.

I really liked the STAR section (Part 2) as well, mainly because if there was something I was unfamiliar with I could just look it up right there in the same book. The inclusion of this section AND the ability to treat it either as a stand alone reference OR an integrated part of the story was an excellent idea.

I plan on reading it again but starting with part 2 and looking back at the references of the story. AND looking for more easter eggs.

This book is also approachable from the standpoint of handing it to a manager, parent, or anyone else who may understand how to use computers as an interface to check their email and consider all this "hacking" to be black magic. I think it does a wonderful job of outlining the attacks so they are understood and easily digested.

I can not recommend this book highly enough.
3 of 3 people found the following review helpful
5.0 out of 5 stars Enticing 29 Nov 2010
By J. M. Garcia - Published on Amazon.com
Format:Paperback|Verified Purchase
The book is simply amazing not only is the information presented in the second portion of the book useful but the story in the first portion of the book made me finish it within 2 days. A must read!
2 of 2 people found the following review helpful
5.0 out of 5 stars Fun read 4 Jan 2013
By Nathan Drennan - Published on Amazon.com
Format:Paperback|Verified Purchase
Having read lots of sci-fi and tech thrillers the story line of this book is really appealing to me. The fact that the attacks and technology in the book are all real makes it that much more exciting, and as informative as textbooks on the topic.

InfoSec students should be required to read this book and I'm sure professionals in the field will love it.
2 of 2 people found the following review helpful
5.0 out of 5 stars Excellent fiction based in reality 8 Nov 2010
By Charles Profitt - Published on Amazon.com
This book is an excellent piece of fiction about a part of the digital world most wish to keep their eyes closed too. While there were a few 'plot holes', they were not serious enough to detract from the enjoyment of the story.

As a computer professional none of the 'tools' or 'techniques' were new to me, but the author put them together in a way that showed how one small 'slip' can lead to larger issues. If you are a computer professional it would be well worth buying this book and after you are done reading it hand it off to some of your non-technical co-workers. Just imagine the horror in their eyes when they joke with you about how unrealistic the book is and you have to tell them that all of the tools and techniques are 100% real and available.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category