Description |
1 online resource (xxii, 303 pages) : illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Series |
Cyber-Fiction Ser. |
|
Cyber-Fiction Ser.
|
Note |
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword |
|
Print version record. |
Contents |
Hide and sneak / Ido Dubrawsky -- The worm turns / Ryan Russell and Tim Mullen -- Just another day at the office / Joe Grand -- h3X's adventures in networkland / FX -- The thief no one saw / Paul Craig -- Flying the friendly skies / Joe Grand -- dis-card / Mark Burnett -- Social (In)Security / Ken Pfeil -- BabelNet / Dan Kaminsky -- The art of tracking / Mark Burnett -- The laws of security / Ryan Russell. |
Summary |
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions |
|
"Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix |
Language |
English. |
Subject |
Hackers -- Fiction.
|
|
Computer security -- Fiction.
|
|
Short stories, American -- 21st century.
|
|
Pirates informatiques -- Romans, nouvelles, etc.
|
|
Sécurité informatique -- Romans, nouvelles, etc.
|
|
Nouvelles américaines -- 21e siècle.
|
|
FICTION -- General.
|
|
Hackers
|
|
Computer security
|
|
Short stories, American
|
Chronological Term |
2000 - 2099
|
Genre/Form |
short stories.
|
|
Short stories
|
|
Fiction
|
|
Short stories.
|
|
Nouvelles.
|
Other Form: |
Print version: Russell, Ryan, 1969- Stealing the network. Rockland, MA : Syngress, ©2003 1931836876 |
ISBN |
1932266682 (electronic bk.) |
|
9781932266689 (electronic bk.) |
|
9781931836876 |
|
1931836876 |
|
1281056138 |
|
9781281056139 |
|
9786611056131 |
|
6611056130 |
|
0080481116 |
|
9780080481111 |
Standard No. |
AU@ 000043011479 |
|
AU@ 000051860159 |
|
AU@ 000053222942 |
|
CHNEW 001004577 |
|
DEBBG BV042307339 |
|
DEBBG BV043167218 |
|
DEBSZ 405314205 |
|
DEBSZ 422427772 |
|
DEBSZ 44905909X |
|
NZ1 12433757 |
|
NZ1 15190331 |
|