Stealing the Network [Elektronisk resurs] The Complete Series Collector's Edition, Final Chapter, and DVD.
-
Long, Johnny. (författare)
-
Russell, Ryan. (författare)
-
Mullen, Timothy. (författare)
- ISBN 9780080949208
- Publicerad: Burlington : Elsevier, 2009
- Engelska 1 online resource (1067 p.)
Innehållsförteckning
Sammanfattning
Ämnesord
Stäng
- Front Cover; Stealing the Network: The Complete Series Collector's Edition; Copyright Page; Contents; Author Biographies; AUTHORS AND TECHNICAL EDITORS; CONTRIBUTING AUTHORS; PART I: How to Own the Box; Foreword; CHAPTER 1 Hide and Sneak; TOOLS; THE SCAN; STUPID CISCO TRICKS; THE COMPUTER IS THE COMPUTER, MR. MCNEALY; THE WEB, THE WEB … IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME…; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW.
- IT'S LIKE BROKEN GLASS YOU GET CUT BEFORE YOU SEE IT; IF YOU LIKE TO GAMBLE; MUMBLE, MUMBLE, MUMBLE; CHAPTER 3 Just Another Day at the Office; SETUP; WELCOMING COMMITTEE; LOW-HANGING FRUIT; IN THE PALM OF MY HAND; FEELING GOOD IN THE NETWORK NEIGHBORHOOD; WHAT'S THAT SMELL?; WORKING FROM HOME; DINER; THE ONLY WAY OUT; EPILOGUE; REFERENCES; CHAPTER 4 h3X's Adventures in Networkland; HALFWAY AROUND THE GLOBE AT BSZH.EDU; EXPLORING THE PREY; D-DAY; TRAINEES FIRST; SECRET SERVICE(S); DISCOVERY; THE GIRL IS BACK IN THE HOUSE; AFTERMATH; CHAPTER 5 The Thief No One Saw; THE TIP-OFF.
- STUDYING THE PREYTHE DNS GIVEAWAY; TIME TO GET MY HANDS DIRTY; GETTING INSIDE THE VPN; FINDING THE SOFTWARE; LOOKING AROUND; CONCLUSION; CHAPTER 6 Flying the Friendly Skies; REFERENCES; CHAPTER 7 dis-card; 0-DAYS; REVERSE-ENGINEERING PEOPLE; INFORMATION; CHAPTER 8 Social (In)Security; RECON; WHAT DOES GOOGLE PULL UP?; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING.
- SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKSBUSINESS AS USUAL?; CHAPTER 9 BabelNet; HELLO NAVI; MIRROR, MIRROR ON THE WALL; POLYGLOT; WHEN GOOD PACKETS GO BAD; AUTHORSPEAK: PAKETTO BORNE; AND THEY SAY WE'RE SOCIAL CREATURES; KNOCK, KNOCK; WHO'S THERE?; SCANRAND; SCANRAND WHO?; SCANRAND U; BACK TO OUR REGULARLY SCHEDULED HACKERY; CHAPTER 10 The Art of Tracking; TUESDAY; WEDNESDAY; THURSDAY; FRIDAY; MONDAY; Appendix: The Laws of Security; INTRODUCTION; KNOWING THE LAWS OF SECURITY; CLIENT-SIDE SECURITY DOESN'T WORK.
- YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM.
- IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT.
- "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black
Ämnesord
- Computer hackers --Fiction. Computer security --Fiction. Cyberterrorism --Fiction. Short stories, American --21st century.
Genre
- Electronic books. (LCSH)
Klassifikation
- PS648.C65 R87 2009 (LCC)
- 005.8 (DDC)
- Pubds (kssb/8 (machine generated))
Inställningar
Hjälp
Titeln finns på 7 bibliotek.
Ange som favorit
-
Kungliga Tekniska högskolan, E-resurser (Tdig)Ange som favorit
-
Bibliotekets lokala katalogTillgång för KTH Biblioteket
-
-
Läs hela (Online access for KTHB) (fulltext) (O'Reilly Learning)
Öppettider, adress m.m.
Ange som favorit
-
Linköpings universitetsbibliotek, E-resurser (LiUd)Ange som favorit
-
Bibliotekets lokala katalog
-
-
Läs hela (Extern tillgång endast anställda och studenter vid LiU) (Skillsoft Books IT Pro Collection (EZproxy))
Öppettider, adress m.m.
Ange som favorit
-
Göteborgs universitetsbibliotek, E-resurser (Gdix)Ange som favorit
-
Bibliotekets lokala katalogFind@GU
-
-
Läs hela (Tillgänglig för Göteborgs universitet / Online access for the University of Gothenburg) (O'Reilly Online Learning: Academic/Public Library Edition:Full Text)
Öppettider, adress m.m.
-
Högskolan i Borås, Biblioteket, Digitala resurser (Hibd)Ange som favorit
-
Bibliotekets lokala katalog
-
-
Läs hela (Tillgänglig för användare inom Högskolan i Borås) (fulltext) (O’Reilly eBooks)
Öppettider, adress m.m.
-
Chalmers tekniska högskola, E-resurser (Zdig)Ange som favorit
-
Bibliotekets lokala katalog
-
-
Läs hela (Online access for Chalmers) (Skillsoft Books IT Pro Collection)
Öppettider, adress m.m.
Ange som favorit
-
Blekinge Tekniska Högskola, biblioteket, Digitala resurser (Bthd)Ange som favorit
-
Bibliotekets webbplats
-
-
Läs hela (Online access for BTH) (O'Reilly Online Learning: Academic/Public Library Edition)
Öppettider, adress m.m.
-
Högskolan Kristianstad, E-resurser (KrhE)Ange som favorit
-
Bibliotekets webbplats
-
-
Läs hela (Online access for HKR) (O'Reilly Academic)
Öppettider, adress m.m.