Stealing the network: how to own a shadow
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
c2007
|
Schriftenreihe: | Stealing the Network Ser
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet |
Beschreibung: | 1 Online-Ressource (xxxvi, 409 p.) |
ISBN: | 0080517757 1429456485 9780080517759 9781429456487 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043158631 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080517757 |9 0-08-051775-7 | ||
020 | |a 1429456485 |c electronic bk. |9 1-4294-5648-5 | ||
020 | |a 9780080517759 |9 978-0-08-051775-9 | ||
020 | |a 9781429456487 |c electronic bk. |9 978-1-4294-5648-7 | ||
035 | |a (OCoLC)85889835 | ||
035 | |a (DE-599)BVBBV043158631 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 813/.6 |2 22 | |
100 | 1 | |a Long, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Stealing the network |b how to own a shadow |c Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor |
246 | 1 | 3 | |a How to own a shadow |
264 | 1 | |a Rockland, Mass. |b Syngress |c c2007 | |
300 | |a 1 Online-Ressource (xxxvi, 409 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Stealing the Network Ser | |
500 | |a "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover | ||
500 | |a Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase | ||
500 | |a The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet | ||
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 4 | |a Hackers |v Fiction | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Cyberterrorism |v Fiction | |
700 | 1 | |a Russell, Ryan |e Sonstige |4 oth | |
700 | 1 | |a Mullen, Timothy M. |e Sonstige |4 oth | |
700 | 1 | |a Pinzon, Scott |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59749-081-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59749-081-8 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028582822 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175626559553536 |
---|---|
any_adam_object | |
author | Long, Johnny |
author_facet | Long, Johnny |
author_role | aut |
author_sort | Long, Johnny |
author_variant | j l jl |
building | Verbundindex |
bvnumber | BV043158631 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)85889835 (DE-599)BVBBV043158631 |
dewey-full | 813/.6 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813/.6 |
dewey-search | 813/.6 |
dewey-sort | 3813 16 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02740nmm a2200541zc 4500</leader><controlfield tag="001">BV043158631</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080517757</subfield><subfield code="9">0-08-051775-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429456485</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4294-5648-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080517759</subfield><subfield code="9">978-0-08-051775-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429456487</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4294-5648-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85889835</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043158631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">813/.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own a shadow</subfield><subfield code="c">Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">How to own a shadow</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxvi, 409 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Stealing the Network Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pinzon, Scott</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59749-081-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59749-081-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028582822</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043158631 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:17Z |
institution | BVB |
isbn | 0080517757 1429456485 9780080517759 9781429456487 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028582822 |
oclc_num | 85889835 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxxvi, 409 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
series2 | Stealing the Network Ser |
spelling | Long, Johnny Verfasser aut Stealing the network how to own a shadow Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor How to own a shadow Rockland, Mass. Syngress c2007 1 Online-Ressource (xxxvi, 409 p.) txt rdacontent c rdamedia cr rdacarrier Stealing the Network Ser "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction Russell, Ryan Sonstige oth Mullen, Timothy M. Sonstige oth Pinzon, Scott Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 1-59749-081-4 Erscheint auch als Druck-Ausgabe, Paperback 978-1-59749-081-8 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405 Aggregator Volltext |
spellingShingle | Long, Johnny Stealing the network how to own a shadow Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
title | Stealing the network how to own a shadow |
title_alt | How to own a shadow |
title_auth | Stealing the network how to own a shadow |
title_exact_search | Stealing the network how to own a shadow |
title_full | Stealing the network how to own a shadow Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor |
title_fullStr | Stealing the network how to own a shadow Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor |
title_full_unstemmed | Stealing the network how to own a shadow Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; Scott Pinzon, story editor |
title_short | Stealing the network |
title_sort | stealing the network how to own a shadow |
title_sub | how to own a shadow |
topic | Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
topic_facet | Hackers Computer security Cyberterrorism Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184405 |
work_keys_str_mv | AT longjohnny stealingthenetworkhowtoownashadow AT russellryan stealingthenetworkhowtoownashadow AT mullentimothym stealingthenetworkhowtoownashadow AT pinzonscott stealingthenetworkhowtoownashadow AT longjohnny howtoownashadow AT russellryan howtoownashadow AT mullentimothym howtoownashadow AT pinzonscott howtoownashadow |