Dissecting the hack: the forb1dd3n network
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, e...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Syngress
© 2010
|
Ausgabe: | Rev. ed |
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xx, 333 pages) illustrations |
ISBN: | 9781597495691 1597495697 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125504 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2010 |||| o||u| ||||||eng d | ||
015 | |a GBA9C3316 |2 dnb | ||
020 | |a 9781597495691 |9 978-1-59749-569-1 | ||
020 | |a 1597495697 |9 1-59749-569-7 | ||
035 | |a (ZDB-33-ESD)ocn652758791 | ||
035 | |a (OCoLC)652758791 | ||
035 | |a (DE-599)BVBBV046125504 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.16/8 |2 22 | |
245 | 1 | 0 | |a Dissecting the hack |b the forb1dd3n network |c Jayson E. Street [and others] |
250 | |a Rev. ed | ||
264 | 1 | |a Amsterdam |a Boston |b Syngress |c © 2010 | |
300 | |a 1 online resource (xx, 333 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum | ||
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 blmlsh | |
650 | 7 | |a Computer crimes / Case studies |2 blmlsh | |
650 | 7 | |a Computer hackers |2 blmlsh | |
650 | 7 | |a Computer networks / Security measures |2 blmlsh | |
650 | 7 | |a Computer security |2 blmlsh | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer crimes |v Case studies | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
700 | 1 | |a Street, Jayson E. |e Sonstige |4 oth | |
700 | 1 | |a Street, Jayson E. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597495689 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597495684 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495684 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505958 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495684 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444701261824 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046125504 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn652758791 (OCoLC)652758791 (DE-599)BVBBV046125504 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
edition | Rev. ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03663nmm a2200601zc 4500</leader><controlfield tag="001">BV046125504</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA9C3316</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495691</subfield><subfield code="9">978-1-59749-569-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495697</subfield><subfield code="9">1-59749-569-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn652758791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)652758791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125504</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dissecting the hack</subfield><subfield code="b">the forb1dd3n network</subfield><subfield code="c">Jayson E. Street [and others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Rev. ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 333 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Case studies</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer hackers</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Street, Jayson E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Street, Jayson E.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597495689</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597495684</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495684</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505958</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495684</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046125504 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495691 1597495697 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505958 |
oclc_num | 652758791 |
open_access_boolean | |
physical | 1 online resource (xx, 333 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
spelling | Dissecting the hack the forb1dd3n network Jayson E. Street [and others] Rev. ed Amsterdam Boston Syngress © 2010 1 online resource (xx, 333 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference, each provides context for the other. Together they will show you how to see the digital world just below the surface of daily life. Yes, the security threats are real! In this revised edition the Part 2 content is completely NEW. Read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit, and expunge with the tools and techniques shown in the story. Revised edition includes a completely NEW STAR Section (Part 2) Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code Introduces basic hacking techniques in real life context for ease of learning Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack Check out the companion site at www.dissectingthehack.com complete with an interactive forum! Exclusive interviews in this revised edition include thoughtful insights into security issues and hacking culture from industry leaders Dan Kaminsky, Johnny Long, Jeff Moss and Marcus Ranum TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer crimes / Investigation fast Hackers fast Computer networks / Security measures fast Computer security fast Computer crimes / Investigation blmlsh Computer crimes / Case studies blmlsh Computer hackers blmlsh Computer networks / Security measures blmlsh Computer security blmlsh Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security (DE-588)4522595-3 Fallstudiensammlung gnd-content Street, Jayson E. Sonstige oth Erscheint auch als Druck-Ausgabe 1597495689 Erscheint auch als Druck-Ausgabe 9781597495684 http://www.sciencedirect.com/science/book/9781597495684 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Dissecting the hack the forb1dd3n network TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer crimes / Investigation fast Hackers fast Computer networks / Security measures fast Computer security fast Computer crimes / Investigation blmlsh Computer crimes / Case studies blmlsh Computer hackers blmlsh Computer networks / Security measures blmlsh Computer security blmlsh Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security |
subject_GND | (DE-588)4522595-3 |
title | Dissecting the hack the forb1dd3n network |
title_auth | Dissecting the hack the forb1dd3n network |
title_exact_search | Dissecting the hack the forb1dd3n network |
title_full | Dissecting the hack the forb1dd3n network Jayson E. Street [and others] |
title_fullStr | Dissecting the hack the forb1dd3n network Jayson E. Street [and others] |
title_full_unstemmed | Dissecting the hack the forb1dd3n network Jayson E. Street [and others] |
title_short | Dissecting the hack |
title_sort | dissecting the hack the forb1dd3n network |
title_sub | the forb1dd3n network |
topic | TRUE CRIME / White Collar Crime bisacsh Computer crimes fast Computer crimes / Investigation fast Hackers fast Computer networks / Security measures fast Computer security fast Computer crimes / Investigation blmlsh Computer crimes / Case studies blmlsh Computer hackers blmlsh Computer networks / Security measures blmlsh Computer security blmlsh Computer crimes Investigation Computer crimes Case studies Hackers Computer networks Security measures Computer security |
topic_facet | TRUE CRIME / White Collar Crime Computer crimes Computer crimes / Investigation Hackers Computer networks / Security measures Computer security Computer crimes / Case studies Computer hackers Computer crimes Investigation Computer crimes Case studies Computer networks Security measures Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9781597495684 |
work_keys_str_mv | AT streetjaysone dissectingthehacktheforb1dd3nnetwork |