|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm61323186 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr nn||||||||| |
008 |
050823s2005 maua o 000 0 eng d |
040 |
|
|
|a NTG
|b eng
|e pn
|c NTG
|d WPG
|d OCLCQ
|d EBLCP
|d YDXCP
|d QE2
|d IDEBK
|d CO3
|d ZCU
|d E7B
|d U5D
|d OCLCQ
|d B24X7
|d DEBBG
|d OCLCO
|d OCLCQ
|d OCLCF
|d DKDLA
|d OCLCQ
|d UKDOC
|d OCLCQ
|d OPELS
|d OCLCO
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d LOA
|d COCUF
|d STF
|d MOR
|d PIFAG
|d MERUC
|d OCLCQ
|d WY@
|d U3W
|d OCLCA
|d WRM
|d D6H
|d NRAMU
|d ICG
|d INT
|d VT2
|d OCLCQ
|d LEAUB
|d DKC
|d AU@
|d OCLCQ
|d OL$
|d OCLCQ
|d UKCRE
|d BOL
|d K6U
|d OCLCQ
|d OCLCO
|d COM
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCL
|d QGK
|d S2H
|d COA
|
019 |
|
|
|a 122371484
|a 162598558
|a 181421102
|a 427384885
|a 507200993
|a 606027923
|a 646728394
|a 961591891
|a 962632638
|a 965982547
|a 984776252
|a 988433548
|a 992116841
|a 1035656576
|a 1037709448
|a 1038647117
|a 1045509483
|a 1055322584
|a 1081267985
|a 1114445927
|a 1153553986
|a 1228571553
|a 1259094607
|a 1289423625
|a 1340054346
|
020 |
|
|
|a 1597490164
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9781597490160
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 0080488889
|
020 |
|
|
|a 9780080488882
|
020 |
|
|
|a 9781928994985
|
020 |
|
|
|a 1928994989
|q (Trade Paper)
|
020 |
|
|
|a 1281035793
|
020 |
|
|
|a 9781281035790
|
020 |
|
|
|a 9786611035792
|
020 |
|
|
|a 6611035796
|
024 |
8 |
|
|a (WaSeSS)ssj0000166788
|
029 |
1 |
|
|a AU@
|b 000050963031
|
029 |
1 |
|
|a AU@
|b 000051557269
|
029 |
1 |
|
|a AU@
|b 000053224293
|
029 |
1 |
|
|a CHBIS
|b 005829710
|
029 |
1 |
|
|a CHNEW
|b 001004801
|
029 |
1 |
|
|a CHVBK
|b 168531941
|
029 |
1 |
|
|a DEBBG
|b BV039832383
|
029 |
1 |
|
|a DEBBG
|b BV042307384
|
029 |
1 |
|
|a DEBBG
|b BV044079402
|
029 |
1 |
|
|a DEBSZ
|b 405313926
|
029 |
1 |
|
|a DEBSZ
|b 430279620
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999927308305765
|
029 |
1 |
|
|a NZ1
|b 12435675
|
029 |
1 |
|
|a NZ1
|b 14540900
|
035 |
|
|
|a (OCoLC)61323186
|z (OCoLC)122371484
|z (OCoLC)162598558
|z (OCoLC)181421102
|z (OCoLC)427384885
|z (OCoLC)507200993
|z (OCoLC)606027923
|z (OCoLC)646728394
|z (OCoLC)961591891
|z (OCoLC)962632638
|z (OCoLC)965982547
|z (OCoLC)984776252
|z (OCoLC)988433548
|z (OCoLC)992116841
|z (OCoLC)1035656576
|z (OCoLC)1037709448
|z (OCoLC)1038647117
|z (OCoLC)1045509483
|z (OCoLC)1055322584
|z (OCoLC)1081267985
|z (OCoLC)1114445927
|z (OCoLC)1153553986
|z (OCoLC)1228571553
|z (OCoLC)1259094607
|z (OCoLC)1289423625
|z (OCoLC)1340054346
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV6773
|b .R644 2005b
|
082 |
0 |
4 |
|a 364.16/8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rogers, Russ.
|
245 |
1 |
0 |
|a Hacking a terror network :
|b the silent threat of covert channels /
|c Russ Rogers ; technical editor, Matthew G. Devost.
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress Pub.,
|c ©2005.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
340 |
|
|
|g polychrome.
|2 rdacc
|0 http://rdaregistry.info/termList/RDAColourContent/1003
|
347 |
|
|
|a text file
|2 rdaft
|0 http://rdaregistry.info/termList/fileType/1002
|
500 |
|
|
|a Includes link to CD content.
|
500 |
|
|
|a Title from title screen.
|
500 |
|
|
|a Title from book cover on Web Page (viewed August 23, 2005).
|
505 |
0 |
|
|a Foreword -- Prologue -- The mind of terror -- Unseen planning -- Making friends -- One step closer -- Over the line -- Images of death -- The real assignment -- Creating the code -- Over the edge -- Biding time -- Covert channels -- Facing the truth -- Taking command -- Racing the clock -- Losing control -- Heightened motivation -- Chasing ghosts -- Taking back control -- Vengeance for deceit -- Elmininating false positives -- Gaining a finger hold -- Compressing timelines -- A plan comes together -- Turning fiction into reality.
|
520 |
8 |
|
|a Annotation Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications. Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Cyberterrorism.
|2 fast
|0 (OCoLC)fst00885802
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
655 |
|
7 |
|a Thrillers (Fiction)
|2 fast
|0 (OCoLC)fst01726755
|
655 |
|
7 |
|a Thrillers (Fiction)
|2 lcgft
|
700 |
1 |
|
|a Devost, Matthew G.
|
776 |
0 |
8 |
|i Print version:
|a Rogers, Russ.
|t Hacking a terror network.
|d Rockland, MA : Syngress : Distributed by O'Reilly Media, ©2005
|z 9781928994985
|w (OCoLC)56874801
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=124655
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 36469
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00004445
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL218977
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10073908
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2730615
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2360392
|
994 |
|
|
|a 92
|b IZTAP
|