Cargando…

Dissecting the hack : the v3rb0ten network /

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the cloc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Street, Jayson E. (Autor), Sims, Kristin (Autor), Baskin, Brian (Autor)
Otros Autores: Martin, Brian (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress is an imprint of Elsevier, [2015]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn914301019
003 OCoLC
005 20231120112009.0
006 m o d
007 cr cnu|||unuuu
008 150723t20152015mau ob 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d EBLCP  |d YDXCP  |d OPELS  |d OCLCF  |d TEFOD  |d COO  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d WRM  |d D6H  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d MERER  |d CUY  |d LOA  |d ZCU  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d OCLCQ  |d CNNOR  |d DKC  |d OCLCQ  |d DCT  |d OCL  |d OCLCQ  |d VLY  |d S2H  |d OCLCO  |d HS0  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 914433830  |a 945800186  |a 1162245525  |a 1224971802  |a 1227636434  |a 1229743890  |a 1257337572 
020 |a 9780128042823  |q (electronic bk.) 
020 |a 0128042826  |q (electronic bk.) 
020 |a 0128042788 
020 |a 9780128042786 
020 |z 9780128042786 
035 |a (OCoLC)914301019  |z (OCoLC)914433830  |z (OCoLC)945800186  |z (OCoLC)1162245525  |z (OCoLC)1224971802  |z (OCoLC)1227636434  |z (OCoLC)1229743890  |z (OCoLC)1257337572 
050 4 |a HV8079.C65 
072 7 |a SOC  |x 004000  |2 bisacsh 
082 0 4 |a 364.16/8  |2 23 
100 1 |a Street, Jayson E.,  |e author. 
245 1 0 |a Dissecting the hack :  |b the v3rb0ten network /  |c Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin. 
264 1 |a Waltham, MA :  |b Syngress is an imprint of Elsevier,  |c [2015] 
264 4 |c �2015 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 24, 2015). 
520 |a Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic 
505 8 |a SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC 
505 8 |a Pentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance 
505 8 |a 3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings 
546 |a English. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer crimes  |v Case studies. 
650 0 |a Hackers. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a Criminalit�e informatique  |x Enqu�etes.  |0 (CaQQLa)201-0278229 
650 6 |a Criminalit�e informatique  |0 (CaQQLa)201-0056438  |v �Etudes de cas.  |0 (CaQQLa)201-0376950 
650 6 |a Pirates informatiques.  |0 (CaQQLa)201-0279206 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer crimes  |x Investigation  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hackers  |2 fast  |0 (OCoLC)fst00872150 
655 2 |a Case Reports  |0 (DNLM)D002363 
655 7 |a Case studies  |2 fast  |0 (OCoLC)fst01423765 
655 7 |a Case studies.  |2 lcgft 
655 7 |a �Etudes de cas.  |2 rvmgf  |0 (CaQQLa)RVMGF-000001726 
700 1 |a Sims, Kristin,  |e author. 
700 1 |a Baskin, Brian,  |e author. 
700 1 |a Martin, Brian,  |e editor. 
776 0 8 |i Print version:  |a Street, Jayson E.  |t Dissecting the Hack : The V3rb0t3n Network.  |d Burlington : Elsevier Science, �2015  |z 9780128042786 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128042786  |z Texto completo