Cargando…

Stealing the network : how to own an identity /

The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Alder, Raven, Mullen, Timothy M., Long, Johnny
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : [Sebastopol, CA] : Syngress ; Distributed by O'Reilly Media, ©2005.
Colección:Stealing the Network Ser.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm64185718
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 060221s2005 maua fo 000 j eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d TUU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OPELS  |d MERUC  |d CCO  |d E7B  |d IDEBK  |d COCUF  |d BAKER  |d COO  |d DKDLA  |d ZCU  |d CSU  |d B24X7  |d UMI  |d DEBSZ  |d OCLCA  |d OCLCO  |d OCLCQ  |d AU@  |d OCLCF  |d OCL  |d OCLCO  |d OCLCQ  |d N$T  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO  |d AZK  |d OCLCO  |d AGLDB  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d TEFOD  |d OCLCQ  |d WY@  |d U3W  |d OCLCA  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d OCLCQ  |d VTS  |d CEF  |d INT  |d NRAMU  |d MOQ  |d VT2  |d OCLCQ  |d A6Q  |d OCLCQ  |d UAB  |d LEAUB  |d OCLCO  |d M8D  |d OCLCO  |d OL$  |d OCLCO  |d UKMGB  |d OCL  |d OCLCQ  |d ADU  |d OCLCO  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCO  |d OCLCQ 
015 |a GBA538839  |2 bnb 
015 |a GBB986492  |2 bnb 
016 7 |a 013190348  |2 Uk 
016 7 |a 017582676  |2 Uk 
019 |a 133169152  |a 162597214  |a 181421155  |a 183265839  |a 473077367  |a 475327188  |a 507575138  |a 560015347  |a 606029734  |a 647464703  |a 712973698  |a 722429562  |a 740946990  |a 765142545  |a 824885559  |a 856952115  |a 961584116  |a 962656569  |a 988524046  |a 991978515  |a 992108978  |a 1035704996  |a 1037505067  |a 1038591302  |a 1045524173  |a 1058022511  |a 1076315476  |a 1081218112  |a 1103279281  |a 1107334311  |a 1129365065  |a 1137106325  |a 1192333533  |a 1228569330 
020 |a 1423754190  |q (electronic bk.) 
020 |a 9781423754190  |q (electronic bk.) 
020 |a 0080517749  |q (electronic bk.) 
020 |a 9780080517742  |q (electronic bk.) 
020 |a 1597490067 
020 |a 9781597490061 
020 |z 9781597490061 
020 |z 1597490067 
024 1 |a 792502900673 
024 3 |a 9781597490061 
029 1 |a AU@  |b 000050492194 
029 1 |a AU@  |b 000050983193 
029 1 |a AU@  |b 000051559400 
029 1 |a AU@  |b 000051859843 
029 1 |a AU@  |b 000053224761 
029 1 |a AU@  |b 000066767131 
029 1 |a CHNEW  |b 001004852 
029 1 |a DEBBG  |b BV039832317 
029 1 |a DEBBG  |b BV041119858 
029 1 |a DEBBG  |b BV042307396 
029 1 |a DEBBG  |b BV043162634 
029 1 |a DEBSZ  |b 396677444 
029 1 |a DEBSZ  |b 405312938 
029 1 |a DEBSZ  |b 422285390 
029 1 |a DEBSZ  |b 430324111 
029 1 |a GBVCP  |b 785365990 
029 1 |a NZ1  |b 12033743 
029 1 |a NZ1  |b 15190345 
029 1 |a UKMGB  |b 017582676 
035 |a (OCoLC)64185718  |z (OCoLC)133169152  |z (OCoLC)162597214  |z (OCoLC)181421155  |z (OCoLC)183265839  |z (OCoLC)473077367  |z (OCoLC)475327188  |z (OCoLC)507575138  |z (OCoLC)560015347  |z (OCoLC)606029734  |z (OCoLC)647464703  |z (OCoLC)712973698  |z (OCoLC)722429562  |z (OCoLC)740946990  |z (OCoLC)765142545  |z (OCoLC)824885559  |z (OCoLC)856952115  |z (OCoLC)961584116  |z (OCoLC)962656569  |z (OCoLC)988524046  |z (OCoLC)991978515  |z (OCoLC)992108978  |z (OCoLC)1035704996  |z (OCoLC)1037505067  |z (OCoLC)1038591302  |z (OCoLC)1045524173  |z (OCoLC)1058022511  |z (OCoLC)1076315476  |z (OCoLC)1081218112  |z (OCoLC)1103279281  |z (OCoLC)1107334311  |z (OCoLC)1129365065  |z (OCoLC)1137106325  |z (OCoLC)1192333533  |z (OCoLC)1228569330 
037 |a 113427:113517  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
037 |a D88BBA54-737A-4A51-B0EC-3F7B878D89D9  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a PS648.C65  |b S742 2005eb 
072 7 |a FIC  |x 000000  |2 bisacsh 
082 0 4 |a [Fic]  |2 22 
049 |a UAMI 
245 0 0 |a Stealing the network :  |b how to own an identity /  |c Raven Alder [and others] ; Timothy Mullen (Thor), contributing author and technical editor ; Johnny Long, contributing author and technical editor. 
246 1 |i Added cover title:  |a You are who the computer says you are 
260 |a Rockland, MA :  |b Syngress ;  |a [Sebastopol, CA] :  |b Distributed by O'Reilly Media,  |c ©2005. 
300 |a 1 online resource (xxiv, 333 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Fiction 
490 1 |a Stealing the Network Ser. 
505 0 |a pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript Café / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor. 
588 0 |a Print version record. 
520 |a The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Identity theft  |v Fiction. 
650 0 |a Computer crimes  |v Fiction. 
650 0 |a Hackers  |v Fiction. 
650 0 |a Computer security  |v Fiction. 
650 0 |a Hackers  |x Psychology  |v Fiction. 
650 6 |a Vol d'identité  |v Romans, nouvelles, etc. 
650 6 |a Criminalité informatique  |v Romans, nouvelles, etc. 
650 6 |a Pirates informatiques  |v Romans, nouvelles, etc. 
650 6 |a Sécurité informatique  |v Romans, nouvelles, etc. 
650 6 |a Pirates informatiques  |x Psychologie  |v Romans, nouvelles, etc. 
650 7 |a FICTION  |x General.  |2 bisacsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Hackers  |x Psychology.  |2 fast  |0 (OCoLC)fst00872151 
650 7 |a Identity theft.  |2 fast  |0 (OCoLC)fst01201137 
655 7 |a short stories.  |2 aat 
655 7 |a Short stories.  |2 fast  |0 (OCoLC)fst01726740 
655 7 |a Fiction.  |2 fast  |0 (OCoLC)fst01423787 
655 7 |a Short stories.  |2 lcgft 
655 7 |a Nouvelles.  |2 rvmgf 
700 1 |a Alder, Raven. 
700 1 |a Mullen, Timothy M. 
700 1 |a Long, Johnny. 
776 0 8 |i Print version:  |t Stealing the network.  |d Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, ©2005  |z 1597490067  |w (OCoLC)60320855 
830 0 |a Stealing the Network Ser. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149574  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597490061/?ar  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00004937 
938 |a Baker & Taylor  |b BKTY  |c 39.95  |d 29.96  |i 1597490067  |n 0006530946  |s active 
938 |a ebrary  |b EBRY  |n ebr10110286 
938 |a EBSCOhost  |b EBSC  |n 149574 
938 |a YBP Library Services  |b YANK  |n 2395143 
938 |a YBP Library Services  |b YANK  |n 2730659 
994 |a 92  |b IZTAP