Stealing the network :: how to own a continent /
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This boo...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2004.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised |
Beschreibung: | Title from e-book title screen (viewed June 10, 2004). "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references. |
ISBN: | 193226678X 9781932266788 9781931836050 1931836051 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm55629598 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 040610s2004 mau ob 000 j eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCG |d OCLCQ |d CGN |d OCLCQ |d OCLCF |d OCLCA |d NLGGC |d OCLCO |d NTG |d BMU |d EBLCP |d U5D |d B24X7 |d OPELS |d DEBSZ |d YDXCP |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d N$T |d OCLCO |d AGLDB |d PLS |d LIV |d OCLCQ |d SAV |d OCLCA |d D6H |d VTS |d OCLCQ |d INT |d OCLCQ |d COO |d WYU |d STF |d G3B |d OL$ |d OCLCO |d OCLCQ |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d OCLCQ | ||
019 | |a 62751888 |a 85844739 |a 162598588 |a 606025802 |a 856952376 |a 1064143721 | ||
020 | |a 193226678X |q (electronic bk.) | ||
020 | |a 9781932266788 |q (electronic bk.) | ||
020 | |a 9781931836050 | ||
020 | |a 1931836051 | ||
035 | |a (OCoLC)55629598 |z (OCoLC)62751888 |z (OCoLC)85844739 |z (OCoLC)162598588 |z (OCoLC)606025802 |z (OCoLC)856952376 |z (OCoLC)1064143721 | ||
050 | 4 | |a PS648.C65 |b S74 2004eb | |
072 | 7 | |a FIC |x 000000 |2 bisacsh | |
082 | 7 | |a 813.08762 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Stealing the network : |b how to own a continent / |c 131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. |
260 | |a Rockland, MA : |b Syngress, |c ©2004. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from e-book title screen (viewed June 10, 2004). | ||
500 | |a "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | 0 | |t Control yourself / |r Ryan Russell -- |t The lagos creeper / |r 131ah -- |t Product of fate: the evolution of a hacker / |r Russ Rogers -- |t A real gullible genius / |r Jay Beale -- |g For whom Ma Bell tolls / |r Joe Grand -- |t Return on investment / |r Fyodor -- |t h3X and the big picture / |r FX -- |t The story of Dex / |r Paul Craig -- |t Automatic terror machine / |r Tim Mullen -- |t Get out quick / |r Ryan Russell. |
520 | |a This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world | ||
520 | |a Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised | ||
650 | 0 | |a Computer security |v Fiction. | |
650 | 0 | |a Hackers |v Fiction. | |
650 | 0 | |a Cyberterrorism |v Fiction. | |
650 | 6 | |a Sécurité informatique |v Romans, nouvelles, etc. | |
650 | 6 | |a Pirates informatiques |v Romans, nouvelles, etc. | |
650 | 6 | |a Cyberterrorisme |v Romans, nouvelles, etc. | |
650 | 7 | |a FICTION |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Hackers |2 fast | |
655 | 7 | |a short stories. |2 aat | |
655 | 7 | |a Fiction |2 fast | |
655 | 7 | |a Short stories |2 fast | |
655 | 7 | |a Suspense fiction. |2 gsafd | |
655 | 7 | |a Short stories. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026542 | |
655 | 7 | |a Nouvelles. |2 rvmgf | |
700 | 0 | |a 131ah. |0 http://id.loc.gov/authorities/names/no2008176966 | |
700 | 1 | |a Russell, Ryan, |d 1969- |1 https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK |0 http://id.loc.gov/authorities/names/nb2002037870 | |
776 | 0 | 8 | |i Print version: |t Stealing the network. |d Rockland, Mass. : Syngress, ©2004 |z 9781931836050 |w (OCoLC)55944900 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109468 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836050 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00003848 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL183951 | ||
938 | |a EBSCOhost |b EBSC |n 109468 | ||
938 | |a Internet Archive |b INAR |n stealingnetworkh0000unse | ||
938 | |a YBP Library Services |b YANK |n 2361884 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm55629598 |
---|---|
_version_ | 1816881615665627136 |
adam_text | |
any_adam_object | |
author2 | 131ah Russell, Ryan, 1969- |
author2_role | |
author2_variant | a r r rr |
author_GND | http://id.loc.gov/authorities/names/no2008176966 http://id.loc.gov/authorities/names/nb2002037870 |
author_additional | Ryan Russell -- 131ah -- Russ Rogers -- Jay Beale -- Joe Grand -- Fyodor -- FX -- Paul Craig -- Tim Mullen -- Ryan Russell. |
author_facet | 131ah Russell, Ryan, 1969- |
author_sort | 131ah |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | P - Language and Literature |
callnumber-label | PS648 |
callnumber-raw | PS648.C65 S74 2004eb |
callnumber-search | PS648.C65 S74 2004eb |
callnumber-sort | PS 3648 C65 S74 42004EB |
callnumber-subject | PS - American Literature |
collection | ZDB-4-EBA |
contents | Control yourself / The lagos creeper / Product of fate: the evolution of a hacker / A real gullible genius / Return on investment / h3X and the big picture / The story of Dex / Automatic terror machine / Get out quick / |
ctrlnum | (OCoLC)55629598 |
dewey-full | 813.08762 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813.08762 |
dewey-search | 813.08762 |
dewey-sort | 3813.08762 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04585cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm55629598 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">040610s2004 mau ob 000 j eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CGN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">EBLCP</subfield><subfield code="d">U5D</subfield><subfield code="d">B24X7</subfield><subfield code="d">OPELS</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PLS</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">G3B</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">62751888</subfield><subfield code="a">85844739</subfield><subfield code="a">162598588</subfield><subfield code="a">606025802</subfield><subfield code="a">856952376</subfield><subfield code="a">1064143721</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226678X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266788</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836050</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55629598</subfield><subfield code="z">(OCoLC)62751888</subfield><subfield code="z">(OCoLC)85844739</subfield><subfield code="z">(OCoLC)162598588</subfield><subfield code="z">(OCoLC)606025802</subfield><subfield code="z">(OCoLC)856952376</subfield><subfield code="z">(OCoLC)1064143721</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">PS648.C65</subfield><subfield code="b">S74 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FIC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">813.08762</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Stealing the network :</subfield><subfield code="b">how to own a continent /</subfield><subfield code="c">131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed June 10, 2004).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Foreword by Jeff Moss, President & CEO, Black Hat, Inc."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Control yourself /</subfield><subfield code="r">Ryan Russell --</subfield><subfield code="t">The lagos creeper /</subfield><subfield code="r">131ah --</subfield><subfield code="t">Product of fate: the evolution of a hacker /</subfield><subfield code="r">Russ Rogers --</subfield><subfield code="t">A real gullible genius /</subfield><subfield code="r">Jay Beale --</subfield><subfield code="g">For whom Ma Bell tolls /</subfield><subfield code="r">Joe Grand --</subfield><subfield code="t">Return on investment /</subfield><subfield code="r">Fyodor --</subfield><subfield code="t">h3X and the big picture /</subfield><subfield code="r">FX --</subfield><subfield code="t">The story of Dex /</subfield><subfield code="r">Paul Craig --</subfield><subfield code="t">Automatic terror machine /</subfield><subfield code="r">Tim Mullen --</subfield><subfield code="t">Get out quick /</subfield><subfield code="r">Ryan Russell.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FICTION</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">short stories.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Suspense fiction.</subfield><subfield code="2">gsafd</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026542</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Nouvelles.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">131ah.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008176966</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan,</subfield><subfield code="d">1969-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2002037870</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Stealing the network.</subfield><subfield code="d">Rockland, Mass. : Syngress, ©2004</subfield><subfield code="z">9781931836050</subfield><subfield code="w">(OCoLC)55944900</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109468</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836050</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003848</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL183951</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">109468</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">stealingnetworkh0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361884</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | short stories. aat Fiction fast Short stories fast Suspense fiction. gsafd Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf |
genre_facet | short stories. Fiction Short stories Suspense fiction. Short stories. Nouvelles. |
id | ZDB-4-EBA-ocm55629598 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:32Z |
institution | BVB |
isbn | 193226678X 9781932266788 9781931836050 1931836051 |
language | English |
oclc_num | 55629598 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress, |
record_format | marc |
spelling | Stealing the network : how to own a continent / 131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. Rockland, MA : Syngress, ©2004. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Title from e-book title screen (viewed June 10, 2004). "Foreword by Jeff Moss, President & CEO, Black Hat, Inc." Includes bibliographical references. Control yourself / Ryan Russell -- The lagos creeper / 131ah -- Product of fate: the evolution of a hacker / Russ Rogers -- A real gullible genius / Jay Beale -- For whom Ma Bell tolls / Joe Grand -- Return on investment / Fyodor -- h3X and the big picture / FX -- The story of Dex / Paul Craig -- Automatic terror machine / Tim Mullen -- Get out quick / Ryan Russell. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised Computer security Fiction. Hackers Fiction. Cyberterrorism Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Cyberterrorisme Romans, nouvelles, etc. FICTION General. bisacsh Computer security fast Cyberterrorism fast Hackers fast short stories. aat Fiction fast Short stories fast Suspense fiction. gsafd Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf 131ah. http://id.loc.gov/authorities/names/no2008176966 Russell, Ryan, 1969- https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK http://id.loc.gov/authorities/names/nb2002037870 Print version: Stealing the network. Rockland, Mass. : Syngress, ©2004 9781931836050 (OCoLC)55944900 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109468 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836050 Volltext |
spellingShingle | Stealing the network : how to own a continent / Control yourself / The lagos creeper / Product of fate: the evolution of a hacker / A real gullible genius / Return on investment / h3X and the big picture / The story of Dex / Automatic terror machine / Get out quick / Computer security Fiction. Hackers Fiction. Cyberterrorism Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Cyberterrorisme Romans, nouvelles, etc. FICTION General. bisacsh Computer security fast Cyberterrorism fast Hackers fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026542 |
title | Stealing the network : how to own a continent / |
title_alt | Control yourself / The lagos creeper / Product of fate: the evolution of a hacker / A real gullible genius / Return on investment / h3X and the big picture / The story of Dex / Automatic terror machine / Get out quick / |
title_auth | Stealing the network : how to own a continent / |
title_exact_search | Stealing the network : how to own a continent / |
title_full | Stealing the network : how to own a continent / 131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. |
title_fullStr | Stealing the network : how to own a continent / 131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. |
title_full_unstemmed | Stealing the network : how to own a continent / 131ah [and others] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer. |
title_short | Stealing the network : |
title_sort | stealing the network how to own a continent |
title_sub | how to own a continent / |
topic | Computer security Fiction. Hackers Fiction. Cyberterrorism Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Cyberterrorisme Romans, nouvelles, etc. FICTION General. bisacsh Computer security fast Cyberterrorism fast Hackers fast |
topic_facet | Computer security Fiction. Hackers Fiction. Cyberterrorism Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Cyberterrorisme Romans, nouvelles, etc. FICTION General. Computer security Cyberterrorism Hackers short stories. Fiction Short stories Suspense fiction. Short stories. Nouvelles. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109468 https://www.sciencedirect.com/science/book/9781931836050 |
work_keys_str_mv | AT 131ah stealingthenetworkhowtoownacontinent AT russellryan stealingthenetworkhowtoownacontinent |