Startsida
Hjälp
Sök i LIBRIS databas

     

 

Sökning: onr:11743435 > Stealing the Network

Stealing the Network [Elektronisk resurs] The Complete Series Collector's Edition, Final Chapter, and DVD.

Long, Johnny. (författare)
Russell, Ryan. (författare)
Mullen, Timothy. (författare)
ISBN 9780080949208
Publicerad: Burlington : Elsevier, 2009
Engelska 1 online resource (1067 p.)
  • E-bok
Innehållsförteckning Sammanfattning Ämnesord
Stäng  
  • Front Cover; Stealing the Network: The Complete Series Collector's Edition; Copyright Page; Contents; Author Biographies; AUTHORS AND TECHNICAL EDITORS; CONTRIBUTING AUTHORS; PART I: How to Own the Box; Foreword; CHAPTER 1 Hide and Sneak; TOOLS; THE SCAN; STUPID CISCO TRICKS; THE COMPUTER IS THE COMPUTER, MR. MCNEALY; THE WEB, THE WEB … IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME…; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW. 
  • IT'S LIKE BROKEN GLASS YOU GET CUT BEFORE YOU SEE IT; IF YOU LIKE TO GAMBLE; MUMBLE, MUMBLE, MUMBLE; CHAPTER 3 Just Another Day at the Office; SETUP; WELCOMING COMMITTEE; LOW-HANGING FRUIT; IN THE PALM OF MY HAND; FEELING GOOD IN THE NETWORK NEIGHBORHOOD; WHAT'S THAT SMELL?; WORKING FROM HOME; DINER; THE ONLY WAY OUT; EPILOGUE; REFERENCES; CHAPTER 4 h3X's Adventures in Networkland; HALFWAY AROUND THE GLOBE AT BSZH.EDU; EXPLORING THE PREY; D-DAY; TRAINEES FIRST; SECRET SERVICE(S); DISCOVERY; THE GIRL IS BACK IN THE HOUSE; AFTERMATH; CHAPTER 5 The Thief No One Saw; THE TIP-OFF. 
  • STUDYING THE PREYTHE DNS GIVEAWAY; TIME TO GET MY HANDS DIRTY; GETTING INSIDE THE VPN; FINDING THE SOFTWARE; LOOKING AROUND; CONCLUSION; CHAPTER 6 Flying the Friendly Skies; REFERENCES; CHAPTER 7 dis-card; 0-DAYS; REVERSE-ENGINEERING PEOPLE; INFORMATION; CHAPTER 8 Social (In)Security; RECON; WHAT DOES GOOGLE PULL UP?; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING. 
  • SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKSBUSINESS AS USUAL?; CHAPTER 9 BabelNet; HELLO NAVI; MIRROR, MIRROR ON THE WALL; POLYGLOT; WHEN GOOD PACKETS GO BAD; AUTHORSPEAK: PAKETTO BORNE; AND THEY SAY WE'RE SOCIAL CREATURES; KNOCK, KNOCK; WHO'S THERE?; SCANRAND; SCANRAND WHO?; SCANRAND U; BACK TO OUR REGULARLY SCHEDULED HACKERY; CHAPTER 10 The Art of Tracking; TUESDAY; WEDNESDAY; THURSDAY; FRIDAY; MONDAY; Appendix: The Laws of Security; INTRODUCTION; KNOWING THE LAWS OF SECURITY; CLIENT-SIDE SECURITY DOESN'T WORK. 
  • YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM. 
  • IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT. 
  • "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black 

Ämnesord

Computer hackers --Fiction. Computer security --Fiction. Cyberterrorism --Fiction. Short stories, American --21st century. 

Genre

Electronic books.  (LCSH)

Klassifikation

PS648.C65 R87 2009 (LCC)
005.8 (DDC)
Pubds (kssb/8 (machine generated))
Inställningar Hjälp

Titeln finns på 7 bibliotek. 

Bibliotek i Stockholmsregionen (1)

Ange som favorit

Bibliotek i östra Sverige (1)

Ange som favorit

Bibliotek i västra Sverige (3)

Ange som favorit

Bibliotek i södra Sverige (2)

Ange som favorit

Sök utanför LIBRIS

Hjälp
Om LIBRIS
Sekretess
Hjälp
Fel i posten?
Kontakt
Teknik och format
Sök utifrån
Sökrutor
Plug-ins
Bookmarklet
Anpassa
Textstorlek
Kontrast
Vyer
LIBRIS söktjänster
SwePub
Uppsök

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

Copyright © LIBRIS - Nationella bibliotekssystem

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy