Stealing the network: how to own an identity
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2005
|
Schriftenreihe: | Stealing the Network Ser
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Added cover title: You are who the computer says you are The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book |
Beschreibung: | 1 Online-Ressource (xxiv, 333 p.) |
ISBN: | 0080517749 1423754190 1597490067 9780080517742 9781423754190 9781597490061 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307396 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080517749 |9 0-08-051774-9 | ||
020 | |a 1423754190 |c electronic bk. |9 1-4237-5419-0 | ||
020 | |a 1597490067 |9 1-59749-006-7 | ||
020 | |a 9780080517742 |9 978-0-08-051774-2 | ||
020 | |a 9781423754190 |c electronic bk. |9 978-1-4237-5419-0 | ||
020 | |a 9781597490061 |9 978-1-59749-006-1 | ||
035 | |a (OCoLC)64185718 | ||
035 | |a (DE-599)BVBBV042307396 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Stealing the network |b how to own an identity |c Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor |
246 | 1 | 3 | |a You are who the computer says you are |
264 | 1 | |a Rockland, MA |b Syngress |c c2005 | |
300 | |a 1 Online-Ressource (xxiv, 333 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Stealing the Network Ser | |
500 | |a Added cover title: You are who the computer says you are | ||
500 | |a The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. | ||
500 | |a The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. | ||
500 | |a * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book | ||
650 | 4 | |a Identity theft | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer hackers / Psychology | |
650 | 7 | |a Identity theft / Fiction |2 local | |
650 | 7 | |a Computer crimes / Fiction |2 local | |
650 | 7 | |a Computer hackers / Fiction |2 local | |
650 | 7 | |a Computer security / Fiction |2 local | |
650 | 7 | |a Computer hackers / Psychology / Fiction |2 local | |
650 | 7 | |a Cyberterrorism / Fiction |2 local | |
650 | 4 | |a Identity theft |v Fiction | |
650 | 4 | |a Computer crimes |v Fiction | |
650 | 4 | |a Hackers |v Fiction | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Hackers |x Psychology |v Fiction | |
653 | |a Short stories | ||
700 | 1 | |a Alder, Raven |e Sonstige |4 oth | |
700 | 1 | |a Mullen, Timothy M. |e Sonstige |4 oth | |
700 | 1 | |a Long, Johnny |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490061 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744388 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597490061 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892649635840 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042307396 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)64185718 (DE-599)BVBBV042307396 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04467nmm a2200673zc 4500</leader><controlfield tag="001">BV042307396</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080517749</subfield><subfield code="9">0-08-051774-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754190</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5419-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490067</subfield><subfield code="9">1-59749-006-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080517742</subfield><subfield code="9">978-0-08-051774-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754190</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5419-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490061</subfield><subfield code="9">978-1-59749-006-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307396</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own an identity</subfield><subfield code="c">Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">You are who the computer says you are</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 333 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Stealing the Network Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Added cover title: You are who the computer says you are</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers / Psychology</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identity theft / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer hackers / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer hackers / Psychology / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Fiction</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="x">Psychology</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Short stories</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alder, Raven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490061</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744388</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490061</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307396 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080517749 1423754190 1597490067 9780080517742 9781423754190 9781597490061 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744388 |
oclc_num | 64185718 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxiv, 333 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
series2 | Stealing the Network Ser |
spelling | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor You are who the computer says you are Rockland, MA Syngress c2005 1 Online-Ressource (xxiv, 333 p.) txt rdacontent c rdamedia cr rdacarrier Stealing the Network Ser Added cover title: You are who the computer says you are The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book Identity theft Computer crimes Computer hackers Computer security Computer hackers / Psychology Identity theft / Fiction local Computer crimes / Fiction local Computer hackers / Fiction local Computer security / Fiction local Computer hackers / Psychology / Fiction local Cyberterrorism / Fiction local Identity theft Fiction Computer crimes Fiction Hackers Fiction Computer security Fiction Hackers Psychology Fiction Short stories Alder, Raven Sonstige oth Mullen, Timothy M. Sonstige oth Long, Johnny Sonstige oth http://www.sciencedirect.com/science/book/9781597490061 Verlag Volltext |
spellingShingle | Stealing the network how to own an identity Identity theft Computer crimes Computer hackers Computer security Computer hackers / Psychology Identity theft / Fiction local Computer crimes / Fiction local Computer hackers / Fiction local Computer security / Fiction local Computer hackers / Psychology / Fiction local Cyberterrorism / Fiction local Identity theft Fiction Computer crimes Fiction Hackers Fiction Computer security Fiction Hackers Psychology Fiction |
title | Stealing the network how to own an identity |
title_alt | You are who the computer says you are |
title_auth | Stealing the network how to own an identity |
title_exact_search | Stealing the network how to own an identity |
title_full | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor |
title_fullStr | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor |
title_full_unstemmed | Stealing the network how to own an identity Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor |
title_short | Stealing the network |
title_sort | stealing the network how to own an identity |
title_sub | how to own an identity |
topic | Identity theft Computer crimes Computer hackers Computer security Computer hackers / Psychology Identity theft / Fiction local Computer crimes / Fiction local Computer hackers / Fiction local Computer security / Fiction local Computer hackers / Psychology / Fiction local Cyberterrorism / Fiction local Identity theft Fiction Computer crimes Fiction Hackers Fiction Computer security Fiction Hackers Psychology Fiction |
topic_facet | Identity theft Computer crimes Computer hackers Computer security Computer hackers / Psychology Identity theft / Fiction Computer crimes / Fiction Computer hackers / Fiction Computer security / Fiction Computer hackers / Psychology / Fiction Cyberterrorism / Fiction Identity theft Fiction Computer crimes Fiction Hackers Fiction Computer security Fiction Hackers Psychology Fiction |
url | http://www.sciencedirect.com/science/book/9781597490061 |
work_keys_str_mv | AT alderraven stealingthenetworkhowtoownanidentity AT mullentimothym stealingthenetworkhowtoownanidentity AT longjohnny stealingthenetworkhowtoownanidentity AT alderraven youarewhothecomputersaysyouare AT mullentimothym youarewhothecomputersaysyouare AT longjohnny youarewhothecomputersaysyouare |