Hacking a Terror Network uses a fictional scenario to demonstrate how terrorists could use the Internet to coordinate and launch a series of deadly attacks. While the scenario may be fictitious, the techniques and technologies that Russ Rogers uses are current and technically accurate. Novices and security professionals will benefit from reading this book and even those not involved in security may enjoy the "thriller" story.
About The Book
In Hacking a Terror Network, Russ Rogers uses the fictitious story of a man following a decade-old grudge against the West. He has adopted his father's pure hatred of America and has vowed to avenge the death of his brother.
An American agent begins to suspect an impending terrorist attack, but he has to gather enough evidence to get someone to believe him in time to do something about it.
It is against this terrorist thriller storyline that Rogers discusses various aspects of hacking, computer security, encryption and steganography.
Syngress has been publishing more of these educational information security books disguised as novels (or cyber-thriller novels disguised as educational information security books). I think they work very well for getting the information delivered in a more entertaining format.
The book also includes a CD which contains the various tools and utilities discussed in the book. You can sort of "play along" with the story or just test the tools out on your own time.
http://rapidshare.com/files/22523015/Hacking_a_Terror_Network.rar
About The Book
In Hacking a Terror Network, Russ Rogers uses the fictitious story of a man following a decade-old grudge against the West. He has adopted his father's pure hatred of America and has vowed to avenge the death of his brother.
An American agent begins to suspect an impending terrorist attack, but he has to gather enough evidence to get someone to believe him in time to do something about it.
It is against this terrorist thriller storyline that Rogers discusses various aspects of hacking, computer security, encryption and steganography.
Syngress has been publishing more of these educational information security books disguised as novels (or cyber-thriller novels disguised as educational information security books). I think they work very well for getting the information delivered in a more entertaining format.
The book also includes a CD which contains the various tools and utilities discussed in the book. You can sort of "play along" with the story or just test the tools out on your own time.
http://rapidshare.com/files/22523015/Hacking_a_Terror_Network.rar
No comments:
Post a Comment