F0rb1dd3n
The Story is F1ct10n The threats are real


Download the audio trailer here.


The Synopsis

"Dissecting the hack: The F0rb1dd3n Network" Is a ground breaking book based on one goal. To inform and educate executives and upper management on the importance of Information Security without alienating or losing them in the process. Though this book will also appeal to the layman and Information Security professional as well. This book has evolved from the presentation "Selling Elephant Whistles" created by Jayson E. Street.


Part 1 - The Story

The story part of this book has a little bit of everything from car chases to shoot outs, Terrorist, the F.B.I. and hackers in a three way cat and mouse game with no one sure sure who is chasing who. The truly amazing factor of this novel is that every computer compromise, every hack, and every exploit in this book. Is a hundred percent true and capable of being used in a real world scenario. which leads the reader to part two of the book.


Part 2 - The Technical Guide

The second part of this book is located after the fictional story and stands alone as a walkthrough of the methodology and tools used in Information Security. This book does not compete with other manuals out on the market today. You will actually find links and the ISBN of these other books to help you learn more about the different disciplines that make up the Information Security field. The goal of this part is to bring the different disciplines of Information Security and the alternate culture of the underground "Black Hat" community into one book. So the reader can gain a better and more complete picture of why hackers attack and why it is important for Information Security to be on the ready to defend!


Part 3 - What brings them together

Throughout the fictional story the reader will come across highlighted areas in the book when hacking tools are mentioned as well as when there is references on the hacking culture, best practices for Information Security and Policies that were or were not in place to defend against a certain attack. If a reader is so compelled they then can stop where they are and look at the technical guide at the back of the book to find out further information on the topic that is taking place in the story. If the reader is reading the technical guide all the way through and sees information on a certain hack or security policy and would like to see how that would relate in a real world scenario the page number from the book where it is located is referenced right there. Making it very easy for the reader to cross reference the entire book in several ways so the reader can choose which one best suits their needs.