|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1103578356 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
160701s2004 xx o 000 0 eng d |
010 |
|
|
|a 2004105897
|
040 |
|
|
|a CEF
|b eng
|e pn
|c CEF
|d OCLCO
|d VT2
|d OCLCO
|d C6I
|d CNCEN
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d LDP
|d HS0
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1103261481
|a 1129350408
|a 1153048836
|a 1180561466
|a 1192351959
|a 1240513561
|
020 |
|
|
|z 0321218736
|
020 |
|
|
|z 9780321218735
|
024 |
8 |
|
|a 9780321218735
|
024 |
8 |
|
|a 0321218736
|
024 |
1 |
|
|a 785342218732
|
029 |
1 |
|
|a AU@
|b 000067096666
|
035 |
|
|
|a (OCoLC)1103578356
|z (OCoLC)1103261481
|z (OCoLC)1129350408
|z (OCoLC)1153048836
|z (OCoLC)1180561466
|z (OCoLC)1192351959
|z (OCoLC)1240513561
|
037 |
|
|
|b 01157628
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Branigan, Steven,
|e author.
|
245 |
1 |
0 |
|a HIGH-TECH CRIMES REVEALED :
|b CYBERWAR STORIES FROM THE DIGITAL FRONT /
|c Branigan, Steven.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Addison-Wesley Professional,
|c 2004.
|
300 |
|
|
|a 1 online resource (448 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 34.99
|
520 |
|
|
|a Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."--Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B ...
|
542 |
|
|
|f Copyright © Addison-Wesley Professional
|g 2005
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
504 |
|
|
|a Includes bibliographical references (p. [389]-395) and index.
|
505 |
0 |
|
|a An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? -- Setting the stage -- High-tech crime -- What not to do -- How to run a high-tech case -- What have we learned.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm)
|
776 |
0 |
8 |
|i Print version:
|a Branigan, Steven.
|t HIGH-TECH CRIMES REVEALED.
|b 1st edition.
|d Addison-Wesley Professional, 2004
|w (DLC) 2004105897
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0321218736/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|