Zero day exploit :: countdown to darkness /
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every m...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2004.
|
Schriftenreihe: | Cyber-Fiction Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community |
Beschreibung: | "Rob Shein aka Rogue Shoten." Title from e-book title screen (viewed September 1, 2004). "Foreword by David Litchfield."--E-book 'cover' page |
Beschreibung: | 1 online resource. |
ISBN: | 1932266763 9781932266764 1931836094 9781931836098 9780080543925 0080543928 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm56406331 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 040901s2004 mau o 000 f eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d BAKER |d YDXCP |d OCLCQ |d OCLCO |d OCLCQ |d NTG |d BTCTA |d NZAUC |d E7B |d EBLCP |d ZCU |d DEBBG |d OPELS |d CO3 |d OCLCF |d OCLCA |d OCLCQ |d OCLCO |d NLGGC |d OCLCQ |d OCL |d DEBSZ |d OCLCQ |d N$T |d AGLDB |d OCLCA |d STF |d D6H |d OCLCQ |d VTS |d INT |d OCLCQ |d G3B |d LEAUB |d OL$ |d VLY |d S2H |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 57367729 |a 85854844 |a 144559456 |a 162720940 |a 507796689 |a 646719742 |a 905666909 |a 961601673 |a 962719596 | ||
020 | |a 1932266763 |q (electronic bk.) | ||
020 | |a 9781932266764 |q (electronic bk.) | ||
020 | |a 1931836094 | ||
020 | |a 9781931836098 | ||
020 | |a 9780080543925 |q (electronic bk.) | ||
020 | |a 0080543928 |q (electronic bk.) | ||
035 | |a (OCoLC)56406331 |z (OCoLC)57367729 |z (OCoLC)85854844 |z (OCoLC)144559456 |z (OCoLC)162720940 |z (OCoLC)507796689 |z (OCoLC)646719742 |z (OCoLC)905666909 |z (OCoLC)961601673 |z (OCoLC)962719596 | ||
050 | 4 | |a PS3619.H45 |b Z47 2004eb | |
072 | 7 | |a FIC |x 000000 |2 bisacsh | |
082 | 7 | |a 813.6 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Shein, Rob. | |
245 | 1 | 0 | |a Zero day exploit : |b countdown to darkness / |c Rob Shein ; Marcus H. Sachs, technical editor. |
260 | |a Rockland, MA : |b Syngress, |c ©2004. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cyber-Fiction Ser. | |
500 | |a "Rob Shein aka Rogue Shoten." | ||
500 | |a Title from e-book title screen (viewed September 1, 2004). | ||
500 | |a "Foreword by David Litchfield."--E-book 'cover' page | ||
520 | |a The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community | ||
505 | 0 | |a Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security | |
650 | 0 | |a Computer security |v Fiction. | |
650 | 0 | |a Hackers |v Fiction. | |
650 | 0 | |a Computer networks |x Security measures |v Fiction. | |
650 | 6 | |a Sécurité informatique |v Romans, nouvelles, etc. | |
650 | 6 | |a Pirates informatiques |v Romans, nouvelles, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Romans, nouvelles, etc. | |
650 | 7 | |a FICTION |x General. |2 bisacsh | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 2 | |a Fictional Work |0 https://id.nlm.nih.gov/mesh/D022922 | |
655 | 7 | |a Fiction |2 fast | |
655 | 7 | |a Fiction. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026339 | |
655 | 7 | |a Romans. |2 rvmgf | |
700 | 1 | |a Sachs, Marcus H. | |
758 | |i has work: |a Zero-day exploit (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGV43JJM9bfrwfV67tQbbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shein, Rob. |t Zero day exploit. |d Rockland, MA : Syngress, ©2004 |z 9781931836098 |w (OCoLC)58728380 |
830 | 0 | |a Cyber-Fiction Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114702 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836098 |3 Volltext |
938 | |a Baker & Taylor |b BKTY |c 49.95 |d 49.95 |i 1932266763 |n 0006210552 |s active |z B&T Title: Cisco Voice Over Ip Security | ||
938 | |a Baker and Taylor |b BTCP |n BK0006210552 | ||
938 | |a EBSCOhost |b EBSC |n 114702 | ||
938 | |a YBP Library Services |b YANK |n 2166734 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm56406331 |
---|---|
_version_ | 1816881618374098944 |
adam_text | |
any_adam_object | |
author | Shein, Rob |
author2 | Sachs, Marcus H. |
author2_role | |
author2_variant | m h s mh mhs |
author_facet | Shein, Rob Sachs, Marcus H. |
author_role | |
author_sort | Shein, Rob |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | P - Language and Literature |
callnumber-label | PS3619 |
callnumber-raw | PS3619.H45 Z47 2004eb |
callnumber-search | PS3619.H45 Z47 2004eb |
callnumber-sort | PS 43619 H45 Z47 42004EB |
callnumber-subject | PS - American Literature |
collection | ZDB-4-EBA |
contents | Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security |
ctrlnum | (OCoLC)56406331 |
dewey-full | 813.6 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813.6 |
dewey-search | 813.6 |
dewey-sort | 3813.6 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04827cam a2200709 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm56406331 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">040901s2004 mau o 000 f eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BAKER</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">BTCTA</subfield><subfield code="d">NZAUC</subfield><subfield code="d">E7B</subfield><subfield code="d">EBLCP</subfield><subfield code="d">ZCU</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OPELS</subfield><subfield code="d">CO3</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">VLY</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">57367729</subfield><subfield code="a">85854844</subfield><subfield code="a">144559456</subfield><subfield code="a">162720940</subfield><subfield code="a">507796689</subfield><subfield code="a">646719742</subfield><subfield code="a">905666909</subfield><subfield code="a">961601673</subfield><subfield code="a">962719596</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266763</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266764</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836094</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836098</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080543925</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080543928</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56406331</subfield><subfield code="z">(OCoLC)57367729</subfield><subfield code="z">(OCoLC)85854844</subfield><subfield code="z">(OCoLC)144559456</subfield><subfield code="z">(OCoLC)162720940</subfield><subfield code="z">(OCoLC)507796689</subfield><subfield code="z">(OCoLC)646719742</subfield><subfield code="z">(OCoLC)905666909</subfield><subfield code="z">(OCoLC)961601673</subfield><subfield code="z">(OCoLC)962719596</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">PS3619.H45</subfield><subfield code="b">Z47 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FIC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">813.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shein, Rob.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero day exploit :</subfield><subfield code="b">countdown to darkness /</subfield><subfield code="c">Rob Shein ; Marcus H. Sachs, technical editor.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cyber-Fiction Ser.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Rob Shein aka Rogue Shoten."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed September 1, 2004).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Foreword by David Litchfield."--E-book 'cover' page</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FICTION</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Fictional Work</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D022922</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026339</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Romans.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sachs, Marcus H.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Zero-day exploit (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGV43JJM9bfrwfV67tQbbd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shein, Rob.</subfield><subfield code="t">Zero day exploit.</subfield><subfield code="d">Rockland, MA : Syngress, ©2004</subfield><subfield code="z">9781931836098</subfield><subfield code="w">(OCoLC)58728380</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cyber-Fiction Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114702</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836098</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">49.95</subfield><subfield code="d">49.95</subfield><subfield code="i">1932266763</subfield><subfield code="n">0006210552</subfield><subfield code="s">active</subfield><subfield code="z">B&T Title: Cisco Voice Over Ip Security</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0006210552</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">114702</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2166734</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Fictional Work https://id.nlm.nih.gov/mesh/D022922 Fiction fast Fiction. lcgft http://id.loc.gov/authorities/genreForms/gf2014026339 Romans. rvmgf |
genre_facet | Fictional Work Fiction Fiction. Romans. |
id | ZDB-4-EBA-ocm56406331 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:35Z |
institution | BVB |
isbn | 1932266763 9781932266764 1931836094 9781931836098 9780080543925 0080543928 |
language | English |
oclc_num | 56406331 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource. |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress, |
record_format | marc |
series | Cyber-Fiction Ser. |
series2 | Cyber-Fiction Ser. |
spelling | Shein, Rob. Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. Rockland, MA : Syngress, ©2004. 1 online resource. text txt rdacontent computer c rdamedia online resource cr rdacarrier Cyber-Fiction Ser. "Rob Shein aka Rogue Shoten." Title from e-book title screen (viewed September 1, 2004). "Foreword by David Litchfield."--E-book 'cover' page The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security Computer security Fiction. Hackers Fiction. Computer networks Security measures Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Réseaux d'ordinateurs Sécurité Mesures Romans, nouvelles, etc. FICTION General. bisacsh Hackers fast Computer networks Security measures fast Computer security fast Fictional Work https://id.nlm.nih.gov/mesh/D022922 Fiction fast Fiction. lcgft http://id.loc.gov/authorities/genreForms/gf2014026339 Romans. rvmgf Sachs, Marcus H. has work: Zero-day exploit (Text) https://id.oclc.org/worldcat/entity/E39PCGV43JJM9bfrwfV67tQbbd https://id.oclc.org/worldcat/ontology/hasWork Print version: Shein, Rob. Zero day exploit. Rockland, MA : Syngress, ©2004 9781931836098 (OCoLC)58728380 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114702 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836098 Volltext |
spellingShingle | Shein, Rob Zero day exploit : countdown to darkness / Cyber-Fiction Ser. Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security Computer security Fiction. Hackers Fiction. Computer networks Security measures Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Réseaux d'ordinateurs Sécurité Mesures Romans, nouvelles, etc. FICTION General. bisacsh Hackers fast Computer networks Security measures fast Computer security fast |
subject_GND | https://id.nlm.nih.gov/mesh/D022922 http://id.loc.gov/authorities/genreForms/gf2014026339 |
title | Zero day exploit : countdown to darkness / |
title_auth | Zero day exploit : countdown to darkness / |
title_exact_search | Zero day exploit : countdown to darkness / |
title_full | Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. |
title_fullStr | Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. |
title_full_unstemmed | Zero day exploit : countdown to darkness / Rob Shein ; Marcus H. Sachs, technical editor. |
title_short | Zero day exploit : |
title_sort | zero day exploit countdown to darkness |
title_sub | countdown to darkness / |
topic | Computer security Fiction. Hackers Fiction. Computer networks Security measures Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Réseaux d'ordinateurs Sécurité Mesures Romans, nouvelles, etc. FICTION General. bisacsh Hackers fast Computer networks Security measures fast Computer security fast |
topic_facet | Computer security Fiction. Hackers Fiction. Computer networks Security measures Fiction. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Réseaux d'ordinateurs Sécurité Mesures Romans, nouvelles, etc. FICTION General. Hackers Computer networks Security measures Computer security Fictional Work Fiction Fiction. Romans. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114702 https://www.sciencedirect.com/science/book/9781931836098 |
work_keys_str_mv | AT sheinrob zerodayexploitcountdowntodarkness AT sachsmarcush zerodayexploitcountdowntodarkness |