Stealing the network: how to own a shadow: the chase for Knuth
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress
2007
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page |
Beschreibung: | "Black hat"--Cover. - " ... fourth book in the "Stealing the network series."--Preface. - Sequel to: Stealing the network : how to own an identity |
Beschreibung: | 1 online resource (xxxvi, 409 pages) illustrations |
ISBN: | 9781597490818 1597490814 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124449 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597490818 |9 978-1-59749-081-8 | ||
020 | |a 1597490814 |9 1-59749-081-4 | ||
035 | |a (ZDB-33-ESD)ocn162597508 | ||
035 | |a (OCoLC)162597508 | ||
035 | |a (DE-599)BVBBV046124449 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Long, Johnny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Stealing the network |b how to own a shadow: the chase for Knuth |c Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor] |
246 | 1 | 3 | |a How to own a shadow |
264 | 1 | |a Rockland, Mass. |b Syngress |c 2007 | |
300 | |a 1 online resource (xxxvi, 409 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Black hat"--Cover. - " ... fourth book in the "Stealing the network series."--Preface. - Sequel to: Stealing the network : how to own an identity | ||
520 | |a The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries | ||
520 | |a This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page | ||
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 4 | |a Hackers |v Fiction | |
650 | 4 | |a Computer security |v Fiction | |
650 | 4 | |a Cyberterrorism |v Fiction | |
700 | 1 | |a Russell, Ryan |d 1969- |e Sonstige |4 oth | |
700 | 1 | |a Mullen, Timothy M. |e Sonstige |4 oth | |
700 | 1 | |a Pinzon, D. Scott |e Sonstige |4 oth | |
710 | 2 | |a Black Hat Press (Goodhue, Minn.) |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490818 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504903 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597490818 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442479329280 |
---|---|
any_adam_object | |
author | Long, Johnny |
author_facet | Long, Johnny |
author_role | aut |
author_sort | Long, Johnny |
author_variant | j l jl |
building | Verbundindex |
bvnumber | BV046124449 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162597508 (OCoLC)162597508 (DE-599)BVBBV046124449 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04276nmm a2200481zc 4500</leader><controlfield tag="001">BV046124449</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490818</subfield><subfield code="9">978-1-59749-081-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490814</subfield><subfield code="9">1-59749-081-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162597508</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162597508</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124449</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own a shadow: the chase for Knuth</subfield><subfield code="c">Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">How to own a shadow</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxvi, 409 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Black hat"--Cover. - " ... fourth book in the "Stealing the network series."--Preface. - Sequel to: Stealing the network : how to own an identity</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pinzon, D. Scott</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Black Hat Press (Goodhue, Minn.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490818</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504903</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490818</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124449 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781597490818 1597490814 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504903 |
oclc_num | 162597508 |
open_access_boolean | |
physical | 1 online resource (xxxvi, 409 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | Long, Johnny Verfasser aut Stealing the network how to own a shadow: the chase for Knuth Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor] How to own a shadow Rockland, Mass. Syngress 2007 1 online resource (xxxvi, 409 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "Black hat"--Cover. - " ... fourth book in the "Stealing the network series."--Preface. - Sequel to: Stealing the network : how to own an identity The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction Russell, Ryan 1969- Sonstige oth Mullen, Timothy M. Sonstige oth Pinzon, D. Scott Sonstige oth Black Hat Press (Goodhue, Minn.) Sonstige oth http://www.sciencedirect.com/science/book/9781597490818 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Long, Johnny Stealing the network how to own a shadow: the chase for Knuth Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
title | Stealing the network how to own a shadow: the chase for Knuth |
title_alt | How to own a shadow |
title_auth | Stealing the network how to own a shadow: the chase for Knuth |
title_exact_search | Stealing the network how to own a shadow: the chase for Knuth |
title_full | Stealing the network how to own a shadow: the chase for Knuth Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor] |
title_fullStr | Stealing the network how to own a shadow: the chase for Knuth Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor] |
title_full_unstemmed | Stealing the network how to own a shadow: the chase for Knuth Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor] |
title_short | Stealing the network |
title_sort | stealing the network how to own a shadow the chase for knuth |
title_sub | how to own a shadow: the chase for Knuth |
topic | Hackers fast Computer security fast Cyberterrorism fast Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
topic_facet | Hackers Computer security Cyberterrorism Hackers Fiction Computer security Fiction Cyberterrorism Fiction |
url | http://www.sciencedirect.com/science/book/9781597490818 |
work_keys_str_mv | AT longjohnny stealingthenetworkhowtoownashadowthechaseforknuth AT russellryan stealingthenetworkhowtoownashadowthechaseforknuth AT mullentimothym stealingthenetworkhowtoownashadowthechaseforknuth AT pinzondscott stealingthenetworkhowtoownashadowthechaseforknuth AT blackhatpressgoodhueminn stealingthenetworkhowtoownashadowthechaseforknuth AT longjohnny howtoownashadow AT russellryan howtoownashadow AT mullentimothym howtoownashadow AT pinzondscott howtoownashadow AT blackhatpressgoodhueminn howtoownashadow |