Stealing the network [electronic resource]
Enlarge text Shrink text- Book
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, th
Title |
Stealing the network [electronic resource] : how to own a shadow / Johnny Long, Timothy (Thor) Mullen, Ryan Russell Scott Pinzon, story editor. |
---|---|
Edition |
1st edition. |
Publisher |
Rockland, MA : Syngress |
Creation Date |
2007 |
Notes |
"Black Hat"--Cover. "... fourth book in the "Stealing the network series."--Preface. "The chase for Knuth"--Cover. English |
Content |
Front Cover Visit us at How to Own a Shadow Copyright Page Acknowledgments Authors Story Editor Technical Inspiration Contributing Authors and Technical Editors, STN: How to Own an Identity Contributing Authors Special Contributor Foreword Contributor Copyeditor Technical Editor and Contributor, STN: How to Own a Continent Contributors Technical Reviewer Technicai Advisors Technical Editor STN: How to Own the Box Preface Foreword Chapter 1. Travel Plans Chapter 2. Back in the Saddle Chapter 3. Old Man and a Ghost Chapter 4. Rootkit Chapter 5. Paul Blue Paint, Dark SkiesRubber Bouncing Swords A Hacker in the Making Chapter 6. The Birth of Pawn Showing Off For Rafa The POST Challenge ""C"" Is For Cookie Chapter 7. Dishonorable Discharge A 'Blah' Sort of Day Just Another Random Encounter Damsel In Distress You're Not Just a Customer First Contact I've got an RFIDea... Testing the Shark-Infested Waters I've Got Good News and Bad News Chapter 8. McGaylver Appendix Sins of the Father The Interview The Post Office The Key The Spreadsheet Codewheels The Restrooom The Address There's Something Else The Chase |
Series |
Stealing the network |
Extent |
1 online resource (448 p.) |
Language |
English |
National Library system number |
997010710056205171 |
MARC RECORDS
Tags
- Computer hackers Fiction.
- Computer security Fiction.
- Cyberterrorism Fiction.
- Attacks on computers
- Computer attacks
- Cyber attacks
- Cyber terrorism
- Cyber war
- Cyberwarfare
- Electronic terrorism (Cyberterrorism)
- Computer privacy
- Computer system security
- Computer systems Protection
- Computer systems Security measures
- Computers Protection
- Computers Security measures
- Cyber security
- Cybersecurity
- Electronic digital computers Security measures
- Protection of computer systems
- Security of computer systems
- nne Computer hackers
Have more information? Found a mistake?