Technology Computer & Networking security

Hacker"s Challenge 3

I have always been a fan of the McGraw-Hill / Osborne network security books. The Hacking Exposed books are some of the best resources on the subject of exploits and countermeasures available.

I particularly enjoyed the Hacker's Challenge books though. Rather than just conveying facts and information, the Hacker's Challenge books teach through short story scenarios that provide details about bizarre occurrences and provide evidence to let the reader try to conduct their own incident response or forensic investigation and determine what has been exploited or compromised.


The second half of the book then provide solutions for each of the challenges, explaining in detail how the main character of the story was able to piece the clues together to get to the bottom of the mystery.

I am very excited to have been able to participate as a co-author on the latest version, Hacker's Challenge 3. It has been an honor and a privilege to work with fellow security experts / authors to come up with twenty new short-story scenarios to entertain while educating about the latest attack techniques and exploit methods being used.

By clicking on the links below, you can read the Challenge and the Solution to one of the stories, A Cup Of Chai. This story was written by one of the other authors, Himanshu Dwivedi. Enjoy the sample chapter and be sure to keep your eyes open to pick up your copy of Hacker's Challenge 3.

reprinted with permission from the McGraw-Hill Companies

Feel free to write back with any comments or questions you have about the book or about this sample chapter.

Leave a reply