Stealing the network :: how to own the box /
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters writt...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2003.
|
Schriftenreihe: | Cyber-Fiction Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix |
Beschreibung: | "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword |
Beschreibung: | 1 online resource (xxii, 303 pages) : illustrations |
ISBN: | 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm52697502 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030722s2003 maua o 000 1 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCG |d CGN |d ABI |d OCLCQ |d TUU |d OCLCQ |d TNF |d EBLCP |d NTG |d BMU |d OPELS |d ZCU |d U5D |d E7B |d OCLCO |d OCLCQ |d DEBSZ |d OCLCQ |d NLGGC |d STF |d OCLCO |d OCLCQ |d AU@ |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d N$T |d OCLCO |d OCL |d OCLCO |d AGLDB |d PIFBR |d LIV |d OCLCQ |d WY@ |d OCLCA |d LUE |d D6H |d VTS |d INT |d TOF |d OCLCQ |d COO |d LEAUB |d OCLCO |d OL$ |d OCLCO |d OCLCQ |d OCLCO |d ADU |d OCLCO |d OCLCQ |d K6U |d VLY |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 56812746 |a 62882152 |a 162598989 |a 507575131 |a 606021203 |a 648302175 |a 793524776 |a 856952198 |a 961599032 |a 962563840 |a 991952798 |a 1000411065 |a 1035702691 |a 1053345209 |a 1162576424 | ||
020 | |a 1932266682 |q (electronic bk.) | ||
020 | |a 9781932266689 |q (electronic bk.) | ||
020 | |a 9781931836876 | ||
020 | |a 1931836876 | ||
020 | |a 1281056138 | ||
020 | |a 9781281056139 | ||
020 | |a 9786611056131 | ||
020 | |a 6611056130 | ||
020 | |a 0080481116 | ||
020 | |a 9780080481111 | ||
035 | |a (OCoLC)52697502 |z (OCoLC)56812746 |z (OCoLC)62882152 |z (OCoLC)162598989 |z (OCoLC)507575131 |z (OCoLC)606021203 |z (OCoLC)648302175 |z (OCoLC)793524776 |z (OCoLC)856952198 |z (OCoLC)961599032 |z (OCoLC)962563840 |z (OCoLC)991952798 |z (OCoLC)1000411065 |z (OCoLC)1035702691 |z (OCoLC)1053345209 |z (OCoLC)1162576424 | ||
050 | 4 | |a PS3618.U874 |b S74 2003eb | |
072 | 7 | |a FIC |x 000000 |2 bisacsh | |
082 | 7 | |a 813/.54 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Russell, Ryan, |d 1969- |1 https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK |0 http://id.loc.gov/authorities/names/nb2002037870 | |
245 | 1 | 0 | |a Stealing the network : |b how to own the box / |c Ryan Russell [and others]. |
260 | |a Rockland, MA : |b Syngress, |c ©2003. | ||
300 | |a 1 online resource (xxii, 303 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cyber-Fiction Ser. | |
500 | |a "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword | ||
588 | 0 | |a Print version record. | |
505 | 0 | 0 | |t Hide and sneak / |r Ido Dubrawsky -- |t The worm turns / |r Ryan Russell and Tim Mullen -- |t Just another day at the office / |r Joe Grand -- |t h3X's adventures in networkland / |r FX -- |g The thief no one saw / |r Paul Craig -- |t Flying the friendly skies / |r Joe Grand -- |t dis-card / |r Mark Burnett -- |t Social (In)Security / |r Ken Pfeil -- |t BabelNet / |r Dan Kaminsky -- |t The art of tracking / |r Mark Burnett -- |t The laws of security / |r Ryan Russell. |
520 | |a "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions | ||
520 | |a "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix | ||
546 | |a English. | ||
650 | 0 | |a Hackers |v Fiction. | |
650 | 0 | |a Computer security |v Fiction. | |
650 | 0 | |a Short stories, American |y 21st century. | |
650 | 6 | |a Pirates informatiques |v Romans, nouvelles, etc. | |
650 | 6 | |a Sécurité informatique |v Romans, nouvelles, etc. | |
650 | 6 | |a Nouvelles américaines |y 21e siècle. | |
650 | 7 | |a FICTION |x General. |2 bisacsh | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Short stories, American |2 fast | |
648 | 7 | |a 2000 - 2099 |2 fast | |
655 | 7 | |a short stories. |2 aat | |
655 | 7 | |a Short stories |2 fast | |
655 | 7 | |a Fiction |2 fast | |
655 | 7 | |a Short stories. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026542 | |
655 | 7 | |a Nouvelles. |2 rvmgf | |
776 | 0 | 8 | |i Print version: |a Russell, Ryan, 1969- |t Stealing the network. |d Rockland, MA : Syngress, ©2003 |z 1931836876 |
830 | 0 | |a Cyber-Fiction Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85654 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836876 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL157369 | ||
938 | |a EBSCOhost |b EBSC |n 85654 | ||
938 | |a Internet Archive |b INAR |n stealingnetworkh0000russ | ||
938 | |a YBP Library Services |b YANK |n 2361879 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm52697502 |
---|---|
_version_ | 1816881608953692160 |
adam_text | |
any_adam_object | |
author | Russell, Ryan, 1969- |
author_GND | http://id.loc.gov/authorities/names/nb2002037870 |
author_additional | Ido Dubrawsky -- Ryan Russell and Tim Mullen -- Joe Grand -- FX -- Paul Craig -- Mark Burnett -- Ken Pfeil -- Dan Kaminsky -- Ryan Russell. |
author_facet | Russell, Ryan, 1969- |
author_role | |
author_sort | Russell, Ryan, 1969- |
author_variant | r r rr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | P - Language and Literature |
callnumber-label | PS3618 |
callnumber-raw | PS3618.U874 S74 2003eb |
callnumber-search | PS3618.U874 S74 2003eb |
callnumber-sort | PS 43618 U874 S74 42003EB |
callnumber-subject | PS - American Literature |
collection | ZDB-4-EBA |
contents | Hide and sneak / The worm turns / Just another day at the office / h3X's adventures in networkland / Flying the friendly skies / dis-card / Social (In)Security / BabelNet / The art of tracking / The laws of security / |
ctrlnum | (OCoLC)52697502 |
dewey-full | 813/.54 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813/.54 |
dewey-search | 813/.54 |
dewey-sort | 3813 254 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
era | 2000 - 2099 fast |
era_facet | 2000 - 2099 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05557cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm52697502 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030722s2003 maua o 000 1 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCG</subfield><subfield code="d">CGN</subfield><subfield code="d">ABI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">OPELS</subfield><subfield code="d">ZCU</subfield><subfield code="d">U5D</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ADU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">56812746</subfield><subfield code="a">62882152</subfield><subfield code="a">162598989</subfield><subfield code="a">507575131</subfield><subfield code="a">606021203</subfield><subfield code="a">648302175</subfield><subfield code="a">793524776</subfield><subfield code="a">856952198</subfield><subfield code="a">961599032</subfield><subfield code="a">962563840</subfield><subfield code="a">991952798</subfield><subfield code="a">1000411065</subfield><subfield code="a">1035702691</subfield><subfield code="a">1053345209</subfield><subfield code="a">1162576424</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266682</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266689</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836876</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836876</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281056138</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281056139</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611056131</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611056130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080481116</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080481111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52697502</subfield><subfield code="z">(OCoLC)56812746</subfield><subfield code="z">(OCoLC)62882152</subfield><subfield code="z">(OCoLC)162598989</subfield><subfield code="z">(OCoLC)507575131</subfield><subfield code="z">(OCoLC)606021203</subfield><subfield code="z">(OCoLC)648302175</subfield><subfield code="z">(OCoLC)793524776</subfield><subfield code="z">(OCoLC)856952198</subfield><subfield code="z">(OCoLC)961599032</subfield><subfield code="z">(OCoLC)962563840</subfield><subfield code="z">(OCoLC)991952798</subfield><subfield code="z">(OCoLC)1000411065</subfield><subfield code="z">(OCoLC)1035702691</subfield><subfield code="z">(OCoLC)1053345209</subfield><subfield code="z">(OCoLC)1162576424</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">PS3618.U874</subfield><subfield code="b">S74 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FIC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">813/.54</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Ryan,</subfield><subfield code="d">1969-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2002037870</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network :</subfield><subfield code="b">how to own the box /</subfield><subfield code="c">Ryan Russell [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 303 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cyber-Fiction Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Hide and sneak /</subfield><subfield code="r">Ido Dubrawsky --</subfield><subfield code="t">The worm turns /</subfield><subfield code="r">Ryan Russell and Tim Mullen --</subfield><subfield code="t">Just another day at the office /</subfield><subfield code="r">Joe Grand --</subfield><subfield code="t">h3X's adventures in networkland /</subfield><subfield code="r">FX --</subfield><subfield code="g">The thief no one saw /</subfield><subfield code="r">Paul Craig --</subfield><subfield code="t">Flying the friendly skies /</subfield><subfield code="r">Joe Grand --</subfield><subfield code="t">dis-card /</subfield><subfield code="r">Mark Burnett --</subfield><subfield code="t">Social (In)Security /</subfield><subfield code="r">Ken Pfeil --</subfield><subfield code="t">BabelNet /</subfield><subfield code="r">Dan Kaminsky --</subfield><subfield code="t">The art of tracking /</subfield><subfield code="r">Mark Burnett --</subfield><subfield code="t">The laws of security /</subfield><subfield code="r">Ryan Russell.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Short stories, American</subfield><subfield code="y">21st century.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Nouvelles américaines</subfield><subfield code="y">21e siècle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FICTION</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Short stories, American</subfield><subfield code="2">fast</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">2000 - 2099</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">short stories.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026542</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Nouvelles.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Russell, Ryan, 1969-</subfield><subfield code="t">Stealing the network.</subfield><subfield code="d">Rockland, MA : Syngress, ©2003</subfield><subfield code="z">1931836876</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cyber-Fiction Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85654</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836876</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL157369</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">85654</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">stealingnetworkh0000russ</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361879</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | short stories. aat Short stories fast Fiction fast Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf |
genre_facet | short stories. Short stories Fiction Short stories. Nouvelles. |
id | ZDB-4-EBA-ocm52697502 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:25Z |
institution | BVB |
isbn | 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 |
language | English |
oclc_num | 52697502 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxii, 303 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress, |
record_format | marc |
series | Cyber-Fiction Ser. |
series2 | Cyber-Fiction Ser. |
spelling | Russell, Ryan, 1969- https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK http://id.loc.gov/authorities/names/nb2002037870 Stealing the network : how to own the box / Ryan Russell [and others]. Rockland, MA : Syngress, ©2003. 1 online resource (xxii, 303 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Cyber-Fiction Ser. "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword Print version record. Hide and sneak / Ido Dubrawsky -- The worm turns / Ryan Russell and Tim Mullen -- Just another day at the office / Joe Grand -- h3X's adventures in networkland / FX -- The thief no one saw / Paul Craig -- Flying the friendly skies / Joe Grand -- dis-card / Mark Burnett -- Social (In)Security / Ken Pfeil -- BabelNet / Dan Kaminsky -- The art of tracking / Mark Burnett -- The laws of security / Ryan Russell. "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix English. Hackers Fiction. Computer security Fiction. Short stories, American 21st century. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Nouvelles américaines 21e siècle. FICTION General. bisacsh Hackers fast Computer security fast Short stories, American fast 2000 - 2099 fast short stories. aat Short stories fast Fiction fast Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf Print version: Russell, Ryan, 1969- Stealing the network. Rockland, MA : Syngress, ©2003 1931836876 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85654 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836876 Volltext |
spellingShingle | Russell, Ryan, 1969- Stealing the network : how to own the box / Cyber-Fiction Ser. Hide and sneak / The worm turns / Just another day at the office / h3X's adventures in networkland / Flying the friendly skies / dis-card / Social (In)Security / BabelNet / The art of tracking / The laws of security / Hackers Fiction. Computer security Fiction. Short stories, American 21st century. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Nouvelles américaines 21e siècle. FICTION General. bisacsh Hackers fast Computer security fast Short stories, American fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026542 |
title | Stealing the network : how to own the box / |
title_alt | Hide and sneak / The worm turns / Just another day at the office / h3X's adventures in networkland / Flying the friendly skies / dis-card / Social (In)Security / BabelNet / The art of tracking / The laws of security / |
title_auth | Stealing the network : how to own the box / |
title_exact_search | Stealing the network : how to own the box / |
title_full | Stealing the network : how to own the box / Ryan Russell [and others]. |
title_fullStr | Stealing the network : how to own the box / Ryan Russell [and others]. |
title_full_unstemmed | Stealing the network : how to own the box / Ryan Russell [and others]. |
title_short | Stealing the network : |
title_sort | stealing the network how to own the box |
title_sub | how to own the box / |
topic | Hackers Fiction. Computer security Fiction. Short stories, American 21st century. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Nouvelles américaines 21e siècle. FICTION General. bisacsh Hackers fast Computer security fast Short stories, American fast |
topic_facet | Hackers Fiction. Computer security Fiction. Short stories, American 21st century. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Nouvelles américaines 21e siècle. FICTION General. Hackers Computer security Short stories, American short stories. Short stories Fiction Short stories. Nouvelles. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85654 https://www.sciencedirect.com/science/book/9781931836876 |
work_keys_str_mv | AT russellryan stealingthenetworkhowtoownthebox |