Cargando…

Hacking a terror network : the silent threat of covert channels /

Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rogers, Russ
Otros Autores: Devost, Matthew G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress Pub., ©2005.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm61323186
003 OCoLC
005 20240329122006.0
006 m o d
007 cr nn|||||||||
008 050823s2005 maua o 000 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d WPG  |d OCLCQ  |d EBLCP  |d YDXCP  |d QE2  |d IDEBK  |d CO3  |d ZCU  |d E7B  |d U5D  |d OCLCQ  |d B24X7  |d DEBBG  |d OCLCO  |d OCLCQ  |d OCLCF  |d DKDLA  |d OCLCQ  |d UKDOC  |d OCLCQ  |d OPELS  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d LOA  |d COCUF  |d STF  |d MOR  |d PIFAG  |d MERUC  |d OCLCQ  |d WY@  |d U3W  |d OCLCA  |d WRM  |d D6H  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d LEAUB  |d DKC  |d AU@  |d OCLCQ  |d OL$  |d OCLCQ  |d UKCRE  |d BOL  |d K6U  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCL  |d QGK  |d S2H  |d COA  |d OCLCO  |d OCLCL  |d EZC 
019 |a 122371484  |a 162598558  |a 181421102  |a 427384885  |a 507200993  |a 606027923  |a 646728394  |a 961591891  |a 962632638  |a 965982547  |a 984776252  |a 988433548  |a 992116841  |a 1034891965  |a 1035656576  |a 1037709448  |a 1038647117  |a 1045509483  |a 1055322584  |a 1081267985  |a 1114445927  |a 1153553986  |a 1228571553  |a 1259094607  |a 1289423625  |a 1340054346 
020 |a 1597490164  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 9781597490160  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 0080488889 
020 |a 9780080488882 
020 |a 9781928994985 
020 |a 1928994989  |q (Trade Paper) 
020 |a 1281035793 
020 |a 9781281035790 
020 |a 9786611035792 
020 |a 6611035796 
024 8 |a (WaSeSS)ssj0000166788 
029 1 |a AU@  |b 000050963031 
029 1 |a AU@  |b 000051557269 
029 1 |a AU@  |b 000053224293 
029 1 |a CHBIS  |b 005829710 
029 1 |a CHNEW  |b 001004801 
029 1 |a CHVBK  |b 168531941 
029 1 |a DEBBG  |b BV039832383 
029 1 |a DEBBG  |b BV042307384 
029 1 |a DEBBG  |b BV044079402 
029 1 |a DEBSZ  |b 405313926 
029 1 |a DEBSZ  |b 430279620 
029 1 |a NZ1  |b 12435675 
029 1 |a NZ1  |b 14540900 
035 |a (OCoLC)61323186  |z (OCoLC)122371484  |z (OCoLC)162598558  |z (OCoLC)181421102  |z (OCoLC)427384885  |z (OCoLC)507200993  |z (OCoLC)606027923  |z (OCoLC)646728394  |z (OCoLC)961591891  |z (OCoLC)962632638  |z (OCoLC)965982547  |z (OCoLC)984776252  |z (OCoLC)988433548  |z (OCoLC)992116841  |z (OCoLC)1034891965  |z (OCoLC)1035656576  |z (OCoLC)1037709448  |z (OCoLC)1038647117  |z (OCoLC)1045509483  |z (OCoLC)1055322584  |z (OCoLC)1081267985  |z (OCoLC)1114445927  |z (OCoLC)1153553986  |z (OCoLC)1228571553  |z (OCoLC)1259094607  |z (OCoLC)1289423625  |z (OCoLC)1340054346 
043 |a n-us--- 
050 4 |a HV6773  |b .R644 2005b 
082 0 4 |a 364.16/8  |2 22 
049 |a UAMI 
100 1 |a Rogers, Russ. 
245 1 0 |a Hacking a terror network :  |b the silent threat of covert channels /  |c Russ Rogers ; technical editor, Matthew G. Devost. 
260 |a Rockland, Mass. :  |b Syngress Pub.,  |c ©2005. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
340 |g polychrome.  |2 rdacc  |0 http://rdaregistry.info/termList/RDAColourContent/1003 
347 |a text file  |2 rdaft  |0 http://rdaregistry.info/termList/fileType/1002 
500 |a Includes link to CD content. 
500 |a Title from title screen. 
500 |a Title from book cover on Web Page (viewed August 23, 2005). 
505 0 |a Foreword -- Prologue -- The mind of terror -- Unseen planning -- Making friends -- One step closer -- Over the line -- Images of death -- The real assignment -- Creating the code -- Over the edge -- Biding time -- Covert channels -- Facing the truth -- Taking command -- Racing the clock -- Losing control -- Heightened motivation -- Chasing ghosts -- Taking back control -- Vengeance for deceit -- Elmininating false positives -- Gaining a finger hold -- Compressing timelines -- A plan comes together -- Turning fiction into reality. 
520 8 |a Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberterrorism. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Cyberterrorisme. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
655 7 |a Thrillers (Fiction)  |2 fast 
655 7 |a Thrillers (Fiction)  |2 lcgft 
655 7 |a dissertations.  |2 aat 
655 7 |a Thèses et écrits académiques.  |2 rvmgf 
700 1 |a Devost, Matthew G. 
758 |i has work:  |a Hacking a terror network (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFCdWYTgJcqbhH9kRxgP6X  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Rogers, Russ.  |t Hacking a terror network.  |d Rockland, MA : Syngress : Distributed by O'Reilly Media, ©2005  |z 9781928994985  |w (OCoLC)56874801 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=218977  |z Texto completo 
938 |a 123Library  |b 123L  |n 36469 
938 |a Books 24x7  |b B247  |n bks00004445 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL218977 
938 |a ebrary  |b EBRY  |n ebr10073908 
938 |a YBP Library Services  |b YANK  |n 2730615 
938 |a YBP Library Services  |b YANK  |n 2360392 
994 |a 92  |b IZTAP