Stealing the network: how to own a continent
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2004
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." Includes bibliographical references This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 1931836051 193226678X 9781931836050 9781932266788 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307349 | ||
003 | DE-604 | ||
005 | 20170504 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2004 |||| o||u| ||||||eng d | ||
020 | |a 1931836051 |9 1-931836-05-1 | ||
020 | |a 193226678X |c electronic bk. |9 1-932266-78-X | ||
020 | |a 9781931836050 |9 978-1-931836-05-0 | ||
020 | |a 9781932266788 |c electronic bk. |9 978-1-932266-78-8 | ||
035 | |a (OCoLC)55629598 | ||
035 | |a (DE-599)BVBBV042307349 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 813.08762 |2 22 | |
245 | 1 | 0 | |a Stealing the network |b how to own a continent |c Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer |
264 | 1 | |a Rockland, MA |b Syngress |c c2004 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." | ||
500 | |a Includes bibliographical references | ||
500 | |a This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world | ||
500 | |a Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised | ||
650 | 7 | |a Fiction |2 fast | |
650 | 7 | |a Suspense fiction |2 gsafd | |
650 | 7 | |a Computer hackers |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Hackers |v Fiction | |
650 | 4 | |a Cyberterrorism |v Fiction | |
653 | |a Short stories | ||
700 | 1 | |a Russell, Ryan |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836050 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744341 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836050 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892541632512 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042307349 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)55629598 (DE-599)BVBBV042307349 |
dewey-full | 813.08762 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813.08762 |
dewey-search | 813.08762 |
dewey-sort | 3813.08762 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02808nmm a2200505zc 4500</leader><controlfield tag="001">BV042307349</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170504 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836051</subfield><subfield code="9">1-931836-05-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226678X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-78-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836050</subfield><subfield code="9">978-1-931836-05-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266788</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-78-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55629598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307349</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">813.08762</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own a continent</subfield><subfield code="c">Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Suspense fiction</subfield><subfield code="2">gsafd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Short stories</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836050</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744341</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836050</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307349 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 1931836051 193226678X 9781931836050 9781932266788 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744341 |
oclc_num | 55629598 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress |
record_format | marc |
spelling | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer Rockland, MA Syngress c2004 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." Includes bibliographical references This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised Fiction fast Suspense fiction gsafd Computer hackers fast Computer security fast Cyberterrorism fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction Short stories Russell, Ryan Sonstige oth http://www.sciencedirect.com/science/book/9781931836050 Verlag Volltext |
spellingShingle | Stealing the network how to own a continent Fiction fast Suspense fiction gsafd Computer hackers fast Computer security fast Cyberterrorism fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
title | Stealing the network how to own a continent |
title_auth | Stealing the network how to own a continent |
title_exact_search | Stealing the network how to own a continent |
title_full | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer |
title_fullStr | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer |
title_full_unstemmed | Stealing the network how to own a continent Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer |
title_short | Stealing the network |
title_sort | stealing the network how to own a continent |
title_sub | how to own a continent |
topic | Fiction fast Suspense fiction gsafd Computer hackers fast Computer security fast Cyberterrorism fast Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
topic_facet | Fiction Suspense fiction Computer hackers Computer security Cyberterrorism Computer security Fiction Hackers Fiction Cyberterrorism Fiction |
url | http://www.sciencedirect.com/science/book/9781931836050 |
work_keys_str_mv | AT russellryan stealingthenetworkhowtoownacontinent |