The Book

Only $9.99 (US)

With so many quality titles out there on computer security, honestly I was a bit skeptical, but this book brings in a breath of fresh air. Dan Dieterle, Cyber Arms

Unlike what most people are led to believe, the hacking problem is not just about hackers and security vulnerabilities. Get an insider’s perspective on computer security and hacking, to learn some of the hidden reasons why hackers have an advantage over their security counterparts. Can the world ever be free of hackers given today’s technology? The answer to this question may surprise you.

OWNED: Why hacking continues to be a problem provides readers with a different perspective on computer security and hacking, by intermixing both subjects and explaining how and why hackers are able break into secured networks and computers.  This book is for anyone using a computer – not just computer security professionals. Information is presented in a simple and concise manner, building readers’ knowledge as they progress through the book.

Readers will learn about:

  • Computer security and hacking basics
  • Why hackers are so successful at breaking into computers
  • The five different types of hackers
  • Advanced hacker techniques
  • How Trojans operate and hide on computers
  • Why computer security personnel do not detect hackers

The world is facing an ever growing computer security crisis and the situation will not improve until people understand the real reasons why hacking continues to be a problem.

Price: Only $9.99 (US)

Preview and Buy the eBook at Smashwords.com

Available Formats: Online Reading (HTML), Online Reading (Javascript), Kindle (.mobi), Epub, PDF, Palm Doc (PDB) and LRF (Sony Reader)

Preview and Buy the eBook at Amazon.com & Amazon.co.uk

Preview and Buy the eBook at Barnes&Noble.com

Buy the eBook at Sony’s Reader Store

Also available on iPad (iBooks).

ISBN 978-1-4523-6220-5 / 9781452362205

TABLE OF CONTENTS

CHAPTER 1: Introduction

Companies, governments and home computer users spend billions of dollars each year on computer security, but hackers are able to break into secured computers anyway.  A personal experience and some personal insights are presented, followed by a brief summary of what information is going to be covered in the book.

CHAPTER 2: The Standard Security Template

Before readers can understand how hackers think and operate, it is important that they understand how security is implemented.  The theory and steps to implement basic security measures for a small office network are explained.

CHAPTER 3: Let’s talk a bit about Chapter 2

Computer security is not easy and there is a reason why it’s not easy.  Four schools of knowledge need to be mastered in order to implement basic security.  Additionally, an implementer needs to be qualified, have someone audit his work, and document the security implementation.  An organization needs to be mindful of the three common security implementation exceptions that significantly put an organization at risk.

CHAPTER 4: Hacking 101 – An Introduction

Even a hacker needs to learn his craft and start with the basics.  What is and isn’t considered hacking?  What type of people are hackers?  How does someone learn to hack?  An overview of how hackers identify, target and attack their victims is presented, as well as the four types of techniques used to break into computers and network devices.

CHAPTER 5: Hacking 201 – Getting more technical

Want to look over the shoulder of a hacker and see how someone is hacked?  An example of how a Web site is hacked to obtain personal and credit card information is explained, including the thought process and strategies for each step.

CHAPTER 6: The Hacker’s Edge

Why are hackers ahead of the security game?  The answer to this question is not as straightforward as you might think.  Find out who is also to blame for the hacking problem we face today.   Ten revealing questions to ask a security expert are presented.

CHAPTER 7: Know Thy Enemy

There are five different types of hackers and each type has its own little quirks, deficiencies and skills. Some hacking terms are explained in more detail and advanced hacking concepts and techniques are covered.

CHAPTER 8: Advanced Recon

Two advanced hacker reconnaissance tactics that give hackers an incredible advantage over their opposing counterparts are discussed.  An “IP map” is a comprehensive database of the Internet that pre-qualifies candidates for compromise once a new vulnerability is discovered.  Well-crafted email delivered to someone’s desktop can be used to gather extensive information about a specific user’s behavior and an organization’s security tools and capabilities.

CHAPTER 9: Smart Trojans and Sleepers

Trojans are the most powerful weapons in a hacker’s toolkit.  Different types of Trojans and how they operate are discussed, including how Trojans avoid detection and how sleeper Trojans lie in hiding, checking for the signal to fully awaken.

CHAPTER 10: Intrusion Detection – Do you see what I see?

If compromise is inevitable, then the ability to detect compromise may be even more important than the security measures.  Security personnel rely heavily on security log files and alarms to identify a hacker on the network.  But how does an organization detect the presence of a hacker, if the security personnel and tools do not see him?

CHAPTER 11: Final Words

A review of the five groups of people who are tied into the hacking problem, along with a rhetorical question, reinforce the reader’s new understanding of why hacking continues to be a problem.  Will the world ever be free of hackers?  One last thought offers a spark of hope.

  1. sue
    April 22, 2012 at 3:16 pm

    Read your book, Interesting, agree with you, thank you. Couple of typos loose instead of lose and port 23 and 22 wrong way around.

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: