Cargando…

Stealing the network : how to own the box /

"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters writt...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Russell, Ryan, 1969-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2003.
Colección:Cyber-Fiction Ser.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm52697502
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 030722s2003 maua o 000 1 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCG  |d CGN  |d ABI  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d EBLCP  |d NTG  |d BMU  |d OPELS  |d ZCU  |d U5D  |d E7B  |d OCLCO  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d NLGGC  |d STF  |d OCLCO  |d OCLCQ  |d AU@  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d N$T  |d OCLCO  |d OCL  |d OCLCO  |d AGLDB  |d PIFBR  |d LIV  |d OCLCQ  |d WY@  |d OCLCA  |d LUE  |d D6H  |d VTS  |d INT  |d TOF  |d OCLCQ  |d COO  |d LEAUB  |d OCLCO  |d OL$  |d OCLCO  |d OCLCQ  |d OCLCO  |d ADU  |d OCLCO  |d OCLCQ  |d K6U  |d VLY  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 56812746  |a 62882152  |a 162598989  |a 507575131  |a 606021203  |a 648302175  |a 793524776  |a 856952198  |a 961599032  |a 962563840  |a 991952798  |a 1000411065  |a 1035702691  |a 1053345209  |a 1162576424 
020 |a 1932266682  |q (electronic bk.) 
020 |a 9781932266689  |q (electronic bk.) 
020 |a 9781931836876 
020 |a 1931836876 
020 |a 1281056138 
020 |a 9781281056139 
020 |a 9786611056131 
020 |a 6611056130 
020 |a 0080481116 
020 |a 9780080481111 
029 1 |a AU@  |b 000043011479 
029 1 |a AU@  |b 000051860159 
029 1 |a AU@  |b 000053222942 
029 1 |a CHNEW  |b 001004577 
029 1 |a DEBBG  |b BV042307339 
029 1 |a DEBBG  |b BV043167218 
029 1 |a DEBSZ  |b 405314205 
029 1 |a DEBSZ  |b 422427772 
029 1 |a DEBSZ  |b 44905909X 
029 1 |a NZ1  |b 12433757 
029 1 |a NZ1  |b 15190331 
035 |a (OCoLC)52697502  |z (OCoLC)56812746  |z (OCoLC)62882152  |z (OCoLC)162598989  |z (OCoLC)507575131  |z (OCoLC)606021203  |z (OCoLC)648302175  |z (OCoLC)793524776  |z (OCoLC)856952198  |z (OCoLC)961599032  |z (OCoLC)962563840  |z (OCoLC)991952798  |z (OCoLC)1000411065  |z (OCoLC)1035702691  |z (OCoLC)1053345209  |z (OCoLC)1162576424 
050 4 |a PS3618.U874  |b S74 2003eb 
072 7 |a FIC  |x 000000  |2 bisacsh 
082 0 4 |a 813/.54  |2 21 
049 |a UAMI 
100 1 |a Russell, Ryan,  |d 1969- 
245 1 0 |a Stealing the network :  |b how to own the box /  |c Ryan Russell [and others]. 
260 |a Rockland, MA :  |b Syngress,  |c ©2003. 
300 |a 1 online resource (xxii, 303 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cyber-Fiction Ser. 
500 |a "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword 
588 0 |a Print version record. 
505 0 0 |t Hide and sneak /  |r Ido Dubrawsky --  |t The worm turns /  |r Ryan Russell and Tim Mullen --  |t Just another day at the office /  |r Joe Grand --  |t h3X's adventures in networkland /  |r FX --  |g The thief no one saw /  |r Paul Craig --  |t Flying the friendly skies /  |r Joe Grand --  |t dis-card /  |r Mark Burnett --  |t Social (In)Security /  |r Ken Pfeil --  |t BabelNet /  |r Dan Kaminsky --  |t The art of tracking /  |r Mark Burnett --  |t The laws of security /  |r Ryan Russell. 
520 |a "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions 
520 |a "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Hackers  |v Fiction. 
650 0 |a Computer security  |v Fiction. 
650 0 |a Short stories, American  |y 21st century. 
650 6 |a Pirates informatiques  |v Romans, nouvelles, etc. 
650 6 |a Sécurité informatique  |v Romans, nouvelles, etc. 
650 6 |a Nouvelles américaines  |y 21e siècle. 
650 7 |a FICTION  |x General.  |2 bisacsh 
650 7 |a Hackers  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Short stories, American  |2 fast 
648 7 |a 2000 - 2099  |2 fast 
655 7 |a short stories.  |2 aat 
655 7 |a Short stories  |2 fast 
655 7 |a Fiction  |2 fast 
655 7 |a Short stories.  |2 lcgft 
655 7 |a Nouvelles.  |2 rvmgf 
776 0 8 |i Print version:  |a Russell, Ryan, 1969-  |t Stealing the network.  |d Rockland, MA : Syngress, ©2003  |z 1931836876 
830 0 |a Cyber-Fiction Ser. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781931836876/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL157369 
938 |a EBSCOhost  |b EBSC  |n 85654 
938 |a Internet Archive  |b INAR  |n stealingnetworkh0000russ 
938 |a YBP Library Services  |b YANK  |n 2361879 
994 |a 92  |b IZTAP