Stealing the network :: how to own an identity /
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA : [Sebastopol, CA] :
Syngress ; Distributed by O'Reilly Media,
©2005.
|
Schriftenreihe: | Stealing the Network Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book |
Beschreibung: | 1 online resource (xxiv, 333 pages) : illustrations |
ISBN: | 1423754190 9781423754190 0080517749 9780080517742 1597490067 9781597490061 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm64185718 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060221s2005 maua fo 000 j eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d OCLCQ |d OPELS |d MERUC |d CCO |d E7B |d IDEBK |d COCUF |d BAKER |d COO |d DKDLA |d ZCU |d CSU |d B24X7 |d UMI |d DEBSZ |d OCLCA |d OCLCO |d OCLCQ |d AU@ |d OCLCF |d OCL |d OCLCO |d OCLCQ |d N$T |d OCLCO |d N$T |d OCLCQ |d OCLCO |d AZK |d OCLCO |d AGLDB |d CNNOR |d MOR |d PIFBR |d LIV |d TEFOD |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d INT |d NRAMU |d MOQ |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d UAB |d LEAUB |d OCLCO |d M8D |d OCLCO |d OL$ |d OCLCO |d UKMGB |d OCL |d OCLCQ |d ADU |d OCLCO |d OCLCQ |d OCLCO |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
015 | |a GBA538839 |2 bnb | ||
015 | |a GBB986492 |2 bnb | ||
016 | 7 | |a 013190348 |2 Uk | |
016 | 7 | |a 017582676 |2 Uk | |
019 | |a 133169152 |a 162597214 |a 181421155 |a 183265839 |a 473077367 |a 475327188 |a 507575138 |a 560015347 |a 606029734 |a 647464703 |a 712973698 |a 722429562 |a 740946990 |a 765142545 |a 824885559 |a 856952115 |a 961584116 |a 962656569 |a 988524046 |a 991978515 |a 992108978 |a 1035704996 |a 1037505067 |a 1038591302 |a 1045524173 |a 1058022511 |a 1076315476 |a 1081218112 |a 1103279281 |a 1107334311 |a 1129365065 |a 1137106325 |a 1192333533 |a 1228569330 | ||
020 | |a 1423754190 |q (electronic bk.) | ||
020 | |a 9781423754190 |q (electronic bk.) | ||
020 | |a 0080517749 |q (electronic bk.) | ||
020 | |a 9780080517742 |q (electronic bk.) | ||
020 | |a 1597490067 | ||
020 | |a 9781597490061 | ||
020 | |z 9781597490061 | ||
020 | |z 1597490067 | ||
024 | 1 | |a 792502900673 | |
024 | 3 | |a 9781597490061 | |
035 | |a (OCoLC)64185718 |z (OCoLC)133169152 |z (OCoLC)162597214 |z (OCoLC)181421155 |z (OCoLC)183265839 |z (OCoLC)473077367 |z (OCoLC)475327188 |z (OCoLC)507575138 |z (OCoLC)560015347 |z (OCoLC)606029734 |z (OCoLC)647464703 |z (OCoLC)712973698 |z (OCoLC)722429562 |z (OCoLC)740946990 |z (OCoLC)765142545 |z (OCoLC)824885559 |z (OCoLC)856952115 |z (OCoLC)961584116 |z (OCoLC)962656569 |z (OCoLC)988524046 |z (OCoLC)991978515 |z (OCoLC)992108978 |z (OCoLC)1035704996 |z (OCoLC)1037505067 |z (OCoLC)1038591302 |z (OCoLC)1045524173 |z (OCoLC)1058022511 |z (OCoLC)1076315476 |z (OCoLC)1081218112 |z (OCoLC)1103279281 |z (OCoLC)1107334311 |z (OCoLC)1129365065 |z (OCoLC)1137106325 |z (OCoLC)1192333533 |z (OCoLC)1228569330 | ||
037 | |a 113427:113517 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
037 | |a D88BBA54-737A-4A51-B0EC-3F7B878D89D9 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a PS648.C65 |b S742 2005eb | |
072 | 7 | |a FIC |x 000000 |2 bisacsh | |
082 | 7 | |a [Fic] |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Stealing the network : |b how to own an identity / |c Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. |
246 | 1 | |i Added cover title: |a You are who the computer says you are | |
260 | |a Rockland, MA : |b Syngress ; |a [Sebastopol, CA] : |b Distributed by O'Reilly Media, |c ©2005. | ||
300 | |a 1 online resource (xxiv, 333 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
380 | |a Fiction | ||
490 | 1 | |a Stealing the Network Ser. | |
505 | 0 | |a pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor. | |
588 | 0 | |a Print version record. | |
520 | |a The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book | ||
650 | 0 | |a Identity theft |v Fiction. | |
650 | 0 | |a Computer crimes |v Fiction. | |
650 | 0 | |a Hackers |v Fiction. | |
650 | 0 | |a Computer security |v Fiction. | |
650 | 0 | |a Hackers |x Psychology |v Fiction. | |
650 | 6 | |a Vol d'identité |v Romans, nouvelles, etc. | |
650 | 6 | |a Criminalité informatique |v Romans, nouvelles, etc. | |
650 | 6 | |a Pirates informatiques |v Romans, nouvelles, etc. | |
650 | 6 | |a Sécurité informatique |v Romans, nouvelles, etc. | |
650 | 6 | |a Pirates informatiques |x Psychologie |v Romans, nouvelles, etc. | |
650 | 7 | |a FICTION |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Hackers |x Psychology |2 fast | |
650 | 7 | |a Identity theft |2 fast | |
655 | 7 | |a short stories. |2 aat | |
655 | 7 | |a Short stories |2 fast | |
655 | 7 | |a Fiction |2 fast | |
655 | 7 | |a Short stories. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026542 | |
655 | 7 | |a Nouvelles. |2 rvmgf | |
700 | 1 | |a Alder, Raven. |0 http://id.loc.gov/authorities/names/no2004075481 | |
700 | 1 | |a Mullen, Timothy M. | |
700 | 1 | |a Long, Johnny. | |
758 | |i has work: |a Stealing the network (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGMxXwc8yRBFFjjxGWtD4q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Stealing the network. |d Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, ©2005 |z 1597490067 |w (OCoLC)60320855 |
830 | 0 | |a Stealing the Network Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149574 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490061 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00004937 | ||
938 | |a Baker & Taylor |b BKTY |c 39.95 |d 29.96 |i 1597490067 |n 0006530946 |s active | ||
938 | |a ebrary |b EBRY |n ebr10110286 | ||
938 | |a EBSCOhost |b EBSC |n 149574 | ||
938 | |a YBP Library Services |b YANK |n 2395143 | ||
938 | |a YBP Library Services |b YANK |n 2730659 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm64185718 |
---|---|
_version_ | 1816881633879392256 |
adam_text | |
any_adam_object | |
author2 | Alder, Raven Mullen, Timothy M. Long, Johnny |
author2_role | |
author2_variant | r a ra t m m tm tmm j l jl |
author_GND | http://id.loc.gov/authorities/names/no2004075481 |
author_facet | Alder, Raven Mullen, Timothy M. Long, Johnny |
author_sort | Alder, Raven |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | P - Language and Literature |
callnumber-label | PS648 |
callnumber-raw | PS648.C65 S742 2005eb |
callnumber-search | PS648.C65 S742 2005eb |
callnumber-sort | PS 3648 C65 S742 42005EB |
callnumber-subject | PS - American Literature |
collection | ZDB-4-EBA |
contents | pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor. |
ctrlnum | (OCoLC)64185718 |
dewey-raw | [Fic] |
dewey-search | [Fic] |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08088cam a2200961 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm64185718 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">060221s2005 maua fo 000 j eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">COCUF</subfield><subfield code="d">BAKER</subfield><subfield code="d">COO</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">CSU</subfield><subfield code="d">B24X7</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">INT</subfield><subfield code="d">NRAMU</subfield><subfield code="d">MOQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ADU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA538839</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB986492</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">013190348</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017582676</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">133169152</subfield><subfield code="a">162597214</subfield><subfield code="a">181421155</subfield><subfield code="a">183265839</subfield><subfield code="a">473077367</subfield><subfield code="a">475327188</subfield><subfield code="a">507575138</subfield><subfield code="a">560015347</subfield><subfield code="a">606029734</subfield><subfield code="a">647464703</subfield><subfield code="a">712973698</subfield><subfield code="a">722429562</subfield><subfield code="a">740946990</subfield><subfield code="a">765142545</subfield><subfield code="a">824885559</subfield><subfield code="a">856952115</subfield><subfield code="a">961584116</subfield><subfield code="a">962656569</subfield><subfield code="a">988524046</subfield><subfield code="a">991978515</subfield><subfield code="a">992108978</subfield><subfield code="a">1035704996</subfield><subfield code="a">1037505067</subfield><subfield code="a">1038591302</subfield><subfield code="a">1045524173</subfield><subfield code="a">1058022511</subfield><subfield code="a">1076315476</subfield><subfield code="a">1081218112</subfield><subfield code="a">1103279281</subfield><subfield code="a">1107334311</subfield><subfield code="a">1129365065</subfield><subfield code="a">1137106325</subfield><subfield code="a">1192333533</subfield><subfield code="a">1228569330</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754190</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754190</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080517749</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080517742</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490067</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490061</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597490061</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490067</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502900673</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781597490061</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185718</subfield><subfield code="z">(OCoLC)133169152</subfield><subfield code="z">(OCoLC)162597214</subfield><subfield code="z">(OCoLC)181421155</subfield><subfield code="z">(OCoLC)183265839</subfield><subfield code="z">(OCoLC)473077367</subfield><subfield code="z">(OCoLC)475327188</subfield><subfield code="z">(OCoLC)507575138</subfield><subfield code="z">(OCoLC)560015347</subfield><subfield code="z">(OCoLC)606029734</subfield><subfield code="z">(OCoLC)647464703</subfield><subfield code="z">(OCoLC)712973698</subfield><subfield code="z">(OCoLC)722429562</subfield><subfield code="z">(OCoLC)740946990</subfield><subfield code="z">(OCoLC)765142545</subfield><subfield code="z">(OCoLC)824885559</subfield><subfield code="z">(OCoLC)856952115</subfield><subfield code="z">(OCoLC)961584116</subfield><subfield code="z">(OCoLC)962656569</subfield><subfield code="z">(OCoLC)988524046</subfield><subfield code="z">(OCoLC)991978515</subfield><subfield code="z">(OCoLC)992108978</subfield><subfield code="z">(OCoLC)1035704996</subfield><subfield code="z">(OCoLC)1037505067</subfield><subfield code="z">(OCoLC)1038591302</subfield><subfield code="z">(OCoLC)1045524173</subfield><subfield code="z">(OCoLC)1058022511</subfield><subfield code="z">(OCoLC)1076315476</subfield><subfield code="z">(OCoLC)1081218112</subfield><subfield code="z">(OCoLC)1103279281</subfield><subfield code="z">(OCoLC)1107334311</subfield><subfield code="z">(OCoLC)1129365065</subfield><subfield code="z">(OCoLC)1137106325</subfield><subfield code="z">(OCoLC)1192333533</subfield><subfield code="z">(OCoLC)1228569330</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">113427:113517</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">D88BBA54-737A-4A51-B0EC-3F7B878D89D9</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">PS648.C65</subfield><subfield code="b">S742 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FIC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">[Fic]</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Stealing the network :</subfield><subfield code="b">how to own an identity /</subfield><subfield code="c">Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor.</subfield></datafield><datafield tag="246" ind1="1" ind2=" "><subfield code="i">Added cover title:</subfield><subfield code="a">You are who the computer says you are</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress ;</subfield><subfield code="a">[Sebastopol, CA] :</subfield><subfield code="b">Distributed by O'Reilly Media,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 333 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="380" ind1=" " ind2=" "><subfield code="a">Fiction</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Stealing the Network Ser.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identity theft</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="x">Psychology</subfield><subfield code="v">Fiction.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Vol d'identité</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques</subfield><subfield code="x">Psychologie</subfield><subfield code="v">Romans, nouvelles, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">FICTION</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="x">Psychology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identity theft</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">short stories.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Fiction</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Short stories.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026542</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Nouvelles.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alder, Raven.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004075481</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Stealing the network (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGMxXwc8yRBFFjjxGWtD4q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Stealing the network.</subfield><subfield code="d">Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, ©2005</subfield><subfield code="z">1597490067</subfield><subfield code="w">(OCoLC)60320855</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Stealing the Network Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149574</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490061</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004937</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">39.95</subfield><subfield code="d">29.96</subfield><subfield code="i">1597490067</subfield><subfield code="n">0006530946</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10110286</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">149574</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2395143</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730659</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | short stories. aat Short stories fast Fiction fast Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf |
genre_facet | short stories. Short stories Fiction Short stories. Nouvelles. |
id | ZDB-4-EBA-ocm64185718 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:50Z |
institution | BVB |
isbn | 1423754190 9781423754190 0080517749 9780080517742 1597490067 9781597490061 |
language | English |
oclc_num | 64185718 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxiv, 333 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress ; Distributed by O'Reilly Media, |
record_format | marc |
series | Stealing the Network Ser. |
series2 | Stealing the Network Ser. |
spelling | Stealing the network : how to own an identity / Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. Added cover title: You are who the computer says you are Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, ©2005. 1 online resource (xxiv, 333 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Fiction Stealing the Network Ser. pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor. Print version record. The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book Identity theft Fiction. Computer crimes Fiction. Hackers Fiction. Computer security Fiction. Hackers Psychology Fiction. Vol d'identité Romans, nouvelles, etc. Criminalité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Psychologie Romans, nouvelles, etc. FICTION General. bisacsh Computer crimes fast Computer security fast Hackers fast Hackers Psychology fast Identity theft fast short stories. aat Short stories fast Fiction fast Short stories. lcgft http://id.loc.gov/authorities/genreForms/gf2014026542 Nouvelles. rvmgf Alder, Raven. http://id.loc.gov/authorities/names/no2004075481 Mullen, Timothy M. Long, Johnny. has work: Stealing the network (Text) https://id.oclc.org/worldcat/entity/E39PCGMxXwc8yRBFFjjxGWtD4q https://id.oclc.org/worldcat/ontology/hasWork Print version: Stealing the network. Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, ©2005 1597490067 (OCoLC)60320855 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149574 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490061 Volltext |
spellingShingle | Stealing the network : how to own an identity / Stealing the Network Ser. pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor. Identity theft Fiction. Computer crimes Fiction. Hackers Fiction. Computer security Fiction. Hackers Psychology Fiction. Vol d'identité Romans, nouvelles, etc. Criminalité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Psychologie Romans, nouvelles, etc. FICTION General. bisacsh Computer crimes fast Computer security fast Hackers fast Hackers Psychology fast Identity theft fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026542 |
title | Stealing the network : how to own an identity / |
title_alt | You are who the computer says you are |
title_auth | Stealing the network : how to own an identity / |
title_exact_search | Stealing the network : how to own an identity / |
title_full | Stealing the network : how to own an identity / Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. |
title_fullStr | Stealing the network : how to own an identity / Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. |
title_full_unstemmed | Stealing the network : how to own an identity / Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. |
title_short | Stealing the network : |
title_sort | stealing the network how to own an identity |
title_sub | how to own an identity / |
topic | Identity theft Fiction. Computer crimes Fiction. Hackers Fiction. Computer security Fiction. Hackers Psychology Fiction. Vol d'identité Romans, nouvelles, etc. Criminalité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Psychologie Romans, nouvelles, etc. FICTION General. bisacsh Computer crimes fast Computer security fast Hackers fast Hackers Psychology fast Identity theft fast |
topic_facet | Identity theft Fiction. Computer crimes Fiction. Hackers Fiction. Computer security Fiction. Hackers Psychology Fiction. Vol d'identité Romans, nouvelles, etc. Criminalité informatique Romans, nouvelles, etc. Pirates informatiques Romans, nouvelles, etc. Sécurité informatique Romans, nouvelles, etc. Pirates informatiques Psychologie Romans, nouvelles, etc. FICTION General. Computer crimes Computer security Hackers Hackers Psychology Identity theft short stories. Short stories Fiction Short stories. Nouvelles. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149574 https://www.sciencedirect.com/science/book/9781597490061 |
work_keys_str_mv | AT alderraven stealingthenetworkhowtoownanidentity AT mullentimothym stealingthenetworkhowtoownanidentity AT longjohnny stealingthenetworkhowtoownanidentity AT alderraven youarewhothecomputersaysyouare AT mullentimothym youarewhothecomputersaysyouare AT longjohnny youarewhothecomputersaysyouare |