Dissecting the hack: the v3rb0ten network
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the cloc...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress is an imprint of Elsevier
[2015]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 online resource |
ISBN: | 9780128042823 0128042826 0128042788 9780128042786 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126887 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2015 |||| o||u| ||||||eng d | ||
020 | |a 9780128042823 |9 978-0-12-804282-3 | ||
020 | |a 0128042826 |9 0-12-804282-6 | ||
020 | |a 0128042788 |9 0-12-804278-8 | ||
020 | |a 9780128042786 |9 978-0-12-804278-6 | ||
035 | |a (ZDB-33-ESD)ocn914301019 | ||
035 | |a (OCoLC)914301019 | ||
035 | |a (DE-599)BVBBV046126887 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.16/8 |2 23 | |
100 | 1 | |a Street, Jayson E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Dissecting the hack |b the v3rb0ten network |c Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin |
264 | 1 | |a Waltham, MA |b Syngress is an imprint of Elsevier |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic | ||
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 4 | |a Computer crimes / Case studies | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Computer crimes |v Case studies | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
700 | 1 | |a Sims, Kristin |4 aut | |
700 | 1 | |a Baskin, Brian |4 aut | |
700 | 1 | |a Martin, Brian |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128042786 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128042786 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031507340 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780128042786 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180447420219392 |
---|---|
any_adam_object | |
author | Street, Jayson E. Sims, Kristin Baskin, Brian |
author2 | Martin, Brian |
author2_role | edt |
author2_variant | b m bm |
author_facet | Street, Jayson E. Sims, Kristin Baskin, Brian Martin, Brian |
author_role | aut aut aut |
author_sort | Street, Jayson E. |
author_variant | j e s je jes k s ks b b bb |
building | Verbundindex |
bvnumber | BV046126887 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn914301019 (OCoLC)914301019 (DE-599)BVBBV046126887 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02878nmm a2200625zc 4500</leader><controlfield tag="001">BV046126887</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128042823</subfield><subfield code="9">978-0-12-804282-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128042826</subfield><subfield code="9">0-12-804282-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128042788</subfield><subfield code="9">0-12-804278-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128042786</subfield><subfield code="9">978-0-12-804278-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn914301019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)914301019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126887</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Street, Jayson E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dissecting the hack</subfield><subfield code="b">the v3rb0ten network</subfield><subfield code="c">Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress is an imprint of Elsevier</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sims, Kristin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baskin, Brian</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Brian</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128042786</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128042786</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507340</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128042786</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046126887 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:54Z |
institution | BVB |
isbn | 9780128042823 0128042826 0128042788 9780128042786 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507340 |
oclc_num | 914301019 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress is an imprint of Elsevier |
record_format | marc |
spelling | Street, Jayson E. Verfasser aut Dissecting the hack the v3rb0ten network Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin Waltham, MA Syngress is an imprint of Elsevier [2015] © 2015 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic SOCIAL SCIENCE / Criminology bisacsh Computer crimes fast Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Hackers fast Computer crimes / Case studies Computer crimes / Investigation Computer networks / Security measures Computer security Hackers Computer crimes Investigation Computer crimes Case studies Computer networks Security measures (DE-588)4522595-3 Fallstudiensammlung gnd-content Sims, Kristin aut Baskin, Brian aut Martin, Brian edt Erscheint auch als Druck-Ausgabe 9780128042786 http://www.sciencedirect.com/science/book/9780128042786 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Street, Jayson E. Sims, Kristin Baskin, Brian Dissecting the hack the v3rb0ten network SOCIAL SCIENCE / Criminology bisacsh Computer crimes fast Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Hackers fast Computer crimes / Case studies Computer crimes / Investigation Computer networks / Security measures Computer security Hackers Computer crimes Investigation Computer crimes Case studies Computer networks Security measures |
subject_GND | (DE-588)4522595-3 |
title | Dissecting the hack the v3rb0ten network |
title_auth | Dissecting the hack the v3rb0ten network |
title_exact_search | Dissecting the hack the v3rb0ten network |
title_full | Dissecting the hack the v3rb0ten network Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin |
title_fullStr | Dissecting the hack the v3rb0ten network Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin |
title_full_unstemmed | Dissecting the hack the v3rb0ten network Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin |
title_short | Dissecting the hack |
title_sort | dissecting the hack the v3rb0ten network |
title_sub | the v3rb0ten network |
topic | SOCIAL SCIENCE / Criminology bisacsh Computer crimes fast Computer crimes / Investigation fast Computer networks / Security measures fast Computer security fast Hackers fast Computer crimes / Case studies Computer crimes / Investigation Computer networks / Security measures Computer security Hackers Computer crimes Investigation Computer crimes Case studies Computer networks Security measures |
topic_facet | SOCIAL SCIENCE / Criminology Computer crimes Computer crimes / Investigation Computer networks / Security measures Computer security Hackers Computer crimes / Case studies Computer crimes Investigation Computer crimes Case studies Computer networks Security measures Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9780128042786 |
work_keys_str_mv | AT streetjaysone dissectingthehackthev3rb0tennetwork AT simskristin dissectingthehackthev3rb0tennetwork AT baskinbrian dissectingthehackthev3rb0tennetwork AT martinbrian dissectingthehackthev3rb0tennetwork |