Hacking a terror network: the silent threat of covert channels
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
©2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes link to CD content. - Title from title screen. - Title from book cover on Web Page (viewed Aug. 23, 2005) Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 0080488889 1597490164 1928994989 9780080488882 9781597490160 9781928994985 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307384 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080488889 |9 0-08-048888-9 | ||
020 | |a 1597490164 |c electronic bk. : Adobe Reader |9 1-59749-016-4 | ||
020 | |a 1928994989 |c Trade Paper |9 1-928994-98-9 | ||
020 | |a 9780080488882 |9 978-0-08-048888-2 | ||
020 | |a 9781597490160 |c electronic bk. : Adobe Reader |9 978-1-59749-016-0 | ||
020 | |a 9781928994985 |9 978-1-928994-98-5 | ||
035 | |a (OCoLC)61323186 | ||
035 | |a (DE-599)BVBBV042307384 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 364.16/8 |2 22 | |
100 | 1 | |a Rogers, Russ |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking a terror network |b the silent threat of covert channels |c Russ Rogers ; technical editor, Matthew G. Devost |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c ©2005 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes link to CD content. - Title from title screen. - Title from book cover on Web Page (viewed Aug. 23, 2005) | ||
500 | |a Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Devost, Matthew G. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781928994985 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744376 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781928994985 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892622372864 |
---|---|
any_adam_object | |
author | Rogers, Russ |
author_facet | Rogers, Russ |
author_role | aut |
author_sort | Rogers, Russ |
author_variant | r r rr |
building | Verbundindex |
bvnumber | BV042307384 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)61323186 (DE-599)BVBBV042307384 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03549nmm a2200505zc 4500</leader><controlfield tag="001">BV042307384</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488889</subfield><subfield code="9">0-08-048888-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490164</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">1-59749-016-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994989</subfield><subfield code="c">Trade Paper</subfield><subfield code="9">1-928994-98-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488882</subfield><subfield code="9">978-0-08-048888-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490160</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">978-1-59749-016-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994985</subfield><subfield code="9">978-1-928994-98-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61323186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307384</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking a terror network</subfield><subfield code="b">the silent threat of covert channels</subfield><subfield code="c">Russ Rogers ; technical editor, Matthew G. Devost</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes link to CD content. - Title from title screen. - Title from book cover on Web Page (viewed Aug. 23, 2005)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Devost, Matthew G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781928994985</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744376</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781928994985</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307384 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080488889 1597490164 1928994989 9780080488882 9781597490160 9781928994985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744376 |
oclc_num | 61323186 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Rogers, Russ Verfasser aut Hacking a terror network the silent threat of covert channels Russ Rogers ; technical editor, Matthew G. Devost Rockland, Mass. Syngress Pub. ©2005 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes link to CD content. - Title from title screen. - Title from book cover on Web Page (viewed Aug. 23, 2005) Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer networks Security measures Cyberterrorism Internet Security measures Computer security Devost, Matthew G. Sonstige oth http://www.sciencedirect.com/science/book/9781928994985 Verlag Volltext |
spellingShingle | Rogers, Russ Hacking a terror network the silent threat of covert channels Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer networks Security measures Cyberterrorism Internet Security measures Computer security |
title | Hacking a terror network the silent threat of covert channels |
title_auth | Hacking a terror network the silent threat of covert channels |
title_exact_search | Hacking a terror network the silent threat of covert channels |
title_full | Hacking a terror network the silent threat of covert channels Russ Rogers ; technical editor, Matthew G. Devost |
title_fullStr | Hacking a terror network the silent threat of covert channels Russ Rogers ; technical editor, Matthew G. Devost |
title_full_unstemmed | Hacking a terror network the silent threat of covert channels Russ Rogers ; technical editor, Matthew G. Devost |
title_short | Hacking a terror network |
title_sort | hacking a terror network the silent threat of covert channels |
title_sub | the silent threat of covert channels |
topic | Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer networks Security measures Cyberterrorism Internet Security measures Computer security |
topic_facet | Computer networks / Security measures Computer security Cyberterrorism Internet / Security measures Computer networks Security measures Internet Security measures |
url | http://www.sciencedirect.com/science/book/9781928994985 |
work_keys_str_mv | AT rogersruss hackingaterrornetworkthesilentthreatofcovertchannels AT devostmatthewg hackingaterrornetworkthesilentthreatofcovertchannels |