Cybertwists: hacking and cyberattacks explained
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Tegernau, Federal Republic of Germany
Richard Paul Hudson
[2018]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 297 Seiten Illustrationen |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV045203725 | ||
003 | DE-604 | ||
005 | 20181109 | ||
007 | t | ||
008 | 180921s2018 gw a||| |||| 00||| eng d | ||
016 | 7 | |a 1154819116 |2 DE-101 | |
020 | |z 9781981885701 |c Broschur |9 978-1981885701 | ||
035 | |a (OCoLC)1054396710 | ||
035 | |a (DE-599)DNB1154819116 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-12 |a DE-19 | ||
100 | 1 | |a Hudson, Richard Paul |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybertwists |b hacking and cyberattacks explained |c Richard Paul Hudson |
264 | 1 | |a Tegernau, Federal Republic of Germany |b Richard Paul Hudson |c [2018] | |
300 | |a 297 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030592638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030592638 | ||
942 | 1 | 1 | |c 302.2 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804178910192074752 |
---|---|
adam_text | CONTENTS
PREFACE
...................................................................................
VII
WARNING
TO
THE
READER
.............................................................
XI
NOTES
ON
LANGUAGE
..................................................................
XII
NOTE
ON
ONLINE
REFERENCES
.....................................................
XIII
THANKS
...................................................................................
XIII
I.
SECRETS
.................................................................................
3
THE
CAESAR
CIPHER
AND
THE
SICILIAN
MAFIA
...............................
5
RECORDING
THE
ENCIPHERED
TEXT
................................................
6
THE
*
NDRANGHETA
AND
THE
SAN
LUCA
CODE
................................
7
RUNNING
KEYS
............................................................................
9
ONE-TIME
PADS
AND
THE
VENONA
PROJECT
................................
12
THE
ENIGMA
MACHINE
.............................................................
14
THE
BLETCHLEY
PARK
PROJECT
....................................................
21
BLOCK-BASED
ENCRYPTION
METHODS
..........................................
27
INITIALISATION
VECTORS
...............................................................
30
ENCRYPTING
STREAMS
OF
INFORMATION
.......................................
31
PRIVATE
AND
PUBLIC
KEYS
...........................................................
33
THE
NSA
AND
PERFECT
FORWARD
SECRECY
................................
35
STEGANOGRAPHY
AND
THE
AL-QAEDA
PORN
VIDEO
......................
38
IV
CONTENTS
THE
NAVAJO
CODE
TALKERS
AND
BERNARDO
PROVENZANO
AGAIN...4O
ENCRYPTION
STANDARDS
..............................................................
42
QUANTUM
COMPUTING
..............................................................
44
BULLRUN
.....................................................................................
47
SECRET
ENCRYPTION
METHODS
.....................................................
49
GOVERNMENT
RESTRICTIONS
ON
ENCRYPTION
................................
50
II.
PROGRAMS
...........................................................................
55
MALWARE:
VIRUSES
AND
WORMS
..................................................
55
EVOLUTIONARY
THEORY
AND
ANTIVIRUS
SOFTWARE..........................
58
SPYING
WITH
ROOTKITS
...............................................................
62
RANSOMWARE:
LOVE
LETTER
AND
CRYPTOLOCKER
......................
63
HUMMINGBAD
AND
BOTNETS
.....................................................
67
DRIVE-BY
DOWNLOADS
AND
KEY
LOGGERS
...................................
68
THE
FUZZY
LINE
BETWEEN
MALWARE
AND
USEFTIL
SOFTWARE
.........
69
PROSUMWARE
.............................................................................
71
ZERO-DAYS
AND
OTHER
VULNERABILITIES
.......................................
73
BUFFER
OVERFLOWS,
CODE
RED
AND
HOMEBREW
WII
...............
76
HEARTBLEED
...............................................................................
81
SNEAKING
COMMANDS
INTO
INPUT
DATA
......................................
85
CROSS-SITE
SCRIPTING
AND
LIONANEESH
......................................
87
VIRAL
TWEETS
..............................................................................
92
COOKIES
AND
TOKENS
.................................................................
94
SQL
INJECTION
..........................................................................
95
LINKEDIN
AND
TALKTALK
..........................................................
99
WHY
SO
MANY
COMPANIES
FALL
VICTIM
....................................
100
III.
IDENTITIES
........................................................................
105
BRUETE
FORCE
AND
UK
PHONE
MAILBOXES
..................................
105
SONY
PICTURES
.........................................................................
107
PASSWORD
HASHES
....................................................................
109
RAINBOW
TABLES
......................................................................
114
SAITS
........................................................................................
116
CONTENTS
V
WORK
FACTORS
.........................................................................
118
TIMING
ATTACKS
......................................................................
119
CROSS-SITE
REQUEST
FORGERY
AND
FACEBOOK
PROFILES
................
121
SECURITY
QUESTIONS
.................................................................
124
INITIAL
PASSWORDS
....................................................................
127
PERMISSIVE
ACTION
LINKS
.......................................................
129
HOME
ROUTER
DEFAULT
PASSWORDS
...........................................
131
BIOMETRIE
IDENTIFICATION
.......................................................
133
E-PASSPORTS
............................................................................
136
STORING
BIOMETRICS
SAFELY
......................................................
138
SOMETHING
YOU
HAVE
AND
BANKING
SCAMS
.............................
139
SECURE
TOKENS
........................................................................
142
SOMETHING
ONLY
YOU
HAVE,
EMV
AND
CHIPTAN
.................
144
CERTIFICATES
.............................................................................
147
PHISHING,
SPEAR
PHISHING
AND
WHALING
.................................
149
EXTENDED
VALIDATION
AND
FREE
CERTIFICATE
SERVICES.................
151
CERTIFICATE
REVOCATION
...........................................................
154
IV.
MESSAGES......................................................................
159
SMURF,
FRAGGLE
AND
THE
PING
OF
DEATH
.................................
160
FIREWALLS,
DDOS
ATTACKS
AND
ANONYMOUS
............................
162
PROTOCOLS
AND
COVERT
CHANNELS
..............................................
163
DNS
AND
THE
BANAMEX
ATTACK
..............................................
167
CACHE
POISONING
...................................................................
169
THE
KAMINSKY
VULNERABILITY
................................................
171
DNSSEC
...............................................................................
175
FAST
FLUX
AND
THE
STORM
WORM
............................................
177
GEORESTRICTIONS
......................................................................
178
TRAFFIC
ANALYSIS
......................................................................
180
ONION
ROUTING
AND
TOR
........................................................
182
SYBIL
ATTACKS,
JURISDICTIONAL
ARBITRAGE
AND
LEAKY
PIPES
........
186
TRACKING
DOWN
TOR
USERS
....................................................
189
VI
CONTENTS
U.S.
ELECTION
HACKING
ALLEGATIONS
..........................................
191
HIDDEN
SERVICES,
INTRODUCTIONS
AND
RENDEZVOUS
POINTS
.......
193
DEMASKING
HIDDEN
SERVICES
..................................................
197
BLOCKCHAIN,
BITCOIN
AND
ETHEREUM
.....................................
199
ALPHABAY,
SILK
ROAD
AND
THE
DREAD
EIRATE
ROBERTS
...........
207
THE
EVIL
SIDE
OF
THE
DARK
WEB
...............................................
210
V.
OBJECTS
_____________________________________
215
LOCAL
NETWORKS,
WI-FI
AND
SNIFFING
....................................
215
TURMOIL,
TURBINE
AND
FOXAC1D
...........................
219
MAC
ADDRESSES,
LOCAL
IP
ADDRESSES
AND
ARP
SPOOFING
.......
221
IP
VERSION
4,
IP
VERSION
6
AND
THE
CARNA
BOTNET
.................
224
QUANTUM
KEY
DISTRIBUTION
...................................................
226
TRICKING
THE
QUANTUM
SENSORS
.............................................
229
COTTONMOUTH,
TEMPEST
AND
ELECTROSMOG
...........
231
KEYPADS
AND
USB
STICKS
.......................................................
234
SOCIAL
ENGINEERING
................................................................
235
SELF-DESTRUCTING
PERIPHERALS
AND
STUXNET
.............................
237
CYBERWAR,
ELECTRICITY
GRIDS
AND
NUCLEAR
POWER
STATIONS
.....
242
NUCLEAR
WEAPONS
...................................................................
246
ETERNALBLUE,
WANNACRY
AND
HMS
QUEEN ELIZABETH
........
250
NOTPETYA
................................................................................
256
THE
INTERNET
OF
THINGS
AND
MY
FRIEND
CAYLA
....................
258
BABY
MONITORS
AND
WEEPING
ANGEL
...................................
261
VEHICLES,
KEY
FOBS
AND
REMOTE
CARJACKING
...........................
263
OUTLOOK
_______________________________________
267
REFERENCES
____________________________________
271
INDEX
___________________________________________
289
|
any_adam_object | 1 |
author | Hudson, Richard Paul |
author_facet | Hudson, Richard Paul |
author_role | aut |
author_sort | Hudson, Richard Paul |
author_variant | r p h rp rph |
building | Verbundindex |
bvnumber | BV045203725 |
ctrlnum | (OCoLC)1054396710 (DE-599)DNB1154819116 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01390nam a22003618c 4500</leader><controlfield tag="001">BV045203725</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181109 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180921s2018 gw a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1154819116</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781981885701</subfield><subfield code="c">Broschur</subfield><subfield code="9">978-1981885701</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1054396710</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1154819116</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hudson, Richard Paul</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybertwists</subfield><subfield code="b">hacking and cyberattacks explained</subfield><subfield code="c">Richard Paul Hudson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Tegernau, Federal Republic of Germany</subfield><subfield code="b">Richard Paul Hudson</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">297 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030592638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030592638</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
id | DE-604.BV045203725 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:11:28Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030592638 |
oclc_num | 1054396710 |
open_access_boolean | |
owner | DE-12 DE-19 DE-BY-UBM |
owner_facet | DE-12 DE-19 DE-BY-UBM |
physical | 297 Seiten Illustrationen |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Richard Paul Hudson |
record_format | marc |
spelling | Hudson, Richard Paul Verfasser aut Cybertwists hacking and cyberattacks explained Richard Paul Hudson Tegernau, Federal Republic of Germany Richard Paul Hudson [2018] 297 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Cyberattacke (DE-588)1075612675 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030592638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hudson, Richard Paul Cybertwists hacking and cyberattacks explained Internetkriminalität (DE-588)7864395-8 gnd Cyberattacke (DE-588)1075612675 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)1075612675 |
title | Cybertwists hacking and cyberattacks explained |
title_auth | Cybertwists hacking and cyberattacks explained |
title_exact_search | Cybertwists hacking and cyberattacks explained |
title_full | Cybertwists hacking and cyberattacks explained Richard Paul Hudson |
title_fullStr | Cybertwists hacking and cyberattacks explained Richard Paul Hudson |
title_full_unstemmed | Cybertwists hacking and cyberattacks explained Richard Paul Hudson |
title_short | Cybertwists |
title_sort | cybertwists hacking and cyberattacks explained |
title_sub | hacking and cyberattacks explained |
topic | Internetkriminalität (DE-588)7864395-8 gnd Cyberattacke (DE-588)1075612675 gnd |
topic_facet | Internetkriminalität Cyberattacke |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030592638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hudsonrichardpaul cybertwistshackingandcyberattacksexplained |