Dissecting the Hack: The Forb1dd3n Network

2537 Words6 Pages

Dissecting the Hack: The Forb1dd3n Network raises the awareness that everyone, both corporate entities and private individuals, is susceptible to a hacking attack. The book is segmented in two parts. The first part contains an interesting work of fiction containing a fairly complex hacking plot. The story is told in the fashion of a Jason Bourne or James Bond plotline. There is mystery, murder, and an air of honesty that involves the reader from start to finish. Part two is the technical "how to" portion of the book that explains in great detail how all of the espionage in the preceding part one actually works. Part two is referred to as Security Threats Are Real (STAR). The book functions well as both a "how to" and as a good story. After enjoying both aspects of the book, one may wonder what others thought about it. Upon discovering a review posted on a personal blog, the McGrew Security website, a reader's opinion of the book may change. The author as a whole gives the narrative portion of the book a fairly positive review; however, the second section did not receive the same consideration (McGrew, 2009a). Apparently the author of the blog found more than a few items plagiarized directly from the Internet. Perhaps even more concerning was that many of the passages were taken directly from Wikipedia: a questionable source for documenting the "scholarly" section of the book (Wikipedia, 2013). For someone interested in learning about hacking and other ethical dilemmas, a question of integrity of the work obviously raises concerns. After doing research, one can find solutions to this problem. Upon discovering the blatant plagiarism that was rampant in the STAR section of the book, the publisher immediately pulled the book from th... ... middle of paper ... ...ty.com/2010/07/27/book-review-revised-edition-of-dissecting-the-hack-the-f0rb1dd3n-network/ Penn, J. (2013, June 13). Writers: 5 Tips on How to Identify Your Target Audience. Retrieved from http://www.thecreativepenn.com/2013/06/13/identify-your-target-audience/ RichM. [pseudonym] (2010, Oct. 1). Book Review: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition. Retrieved from https://www.ethicalhacker.net/features/book-reviews/book-review-dissecting-the-hack-the-f0rb1dd3n-network-revised-edition Street, J., Nabors, K., Baskin, B. (2010). Dissecting the Hack: The Forb1dd3n Network. Burlington, MA: Syngress. Weiner-Bronner, D. (2013, Dec. 5). Facebook, Google, Twitter Users Among the Nearly 2 Million Accounts Hacked by Botnets. Retrieved from http://news.yahoo.com/facebook-google-twitter-users-among-nearly-2-million-124811240.html;_ylt=A2KJ3Ca5f6BStHIA5kXQtDMD

Open Document