Filtern nach
Letzte Suchanfragen

Ergebnisse für *

Zeige Ergebnisse 1 bis 9 von 9.

  1. Stealing the network
    how to own the box
    Erschienen: 2003
    Verlag:  Syngress Pub, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

    Technische Universität Hamburg, Universitätsbibliothek
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix Stealing the Network: How to Own the Box is NOT intended to be a install, configure, update, troubleshoot, and defend book. It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the street fighting tactics used to attack networks and systems. Not just another hacker book, it plays on edgy market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile White Hats, Black Hats and Gray Hats Gives readers a first ever look inside some of the most notorious network intrusions

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Computer hackers; Computer security; Short stories, American; Hackers
    Umfang: Online-Ressource (xxii, 303 p), ill, 24 cm
    Bemerkung(en):

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."--Cover

    Electronic reproduction; Mode of access: World Wide Web

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  2. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: ©2003
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer security; Short stories, American; Electronic books
    Umfang: 1 Online-Ressource (xxii, 303 pages)
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    Hide and sneak - Ido Dubrawsky -- - The worm turns - Ryan Russell and Tim Mullen -- - Just another day at the office - Joe Grand -- - h3X's adventures in networkland - FX -- - The thief no one saw - Paul Craig -- - Flying the friendly skies - Joe Grand -- - dis-card - Mark Burnett -- - Social (In)Security - Ken Pfeil -- - BabelNet - Dan Kaminsky -- - The art of tracking - Mark Burnett -- - The laws of security - Ryan Russell

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  3. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: © 2003
    Verlag:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: FICTION / General; Hackers; Computer security; Short stories, American; Electronic books; Electronic book collection; Hackers; Computer security; Short stories, American
    Umfang: 1 online resource (xxii, 303 pages), illustrations
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

  4. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: ©2003
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer security; Short stories, American
    Weitere Schlagworte: Short stories
    Umfang: 1 Online-Ressource (xxii, 303 pages)
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  5. Stealing the network
    how to own the box
    Erschienen: c2003
    Verlag:  Syngress, Rockland, MA

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark... mehr

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    keine Fernleihe
    Universitätsbibliothek Braunschweig
    keine Fernleihe
    Zentrale Hochschulbibliothek Lübeck
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Universitätsbibliothek Rostock
    keine Fernleihe

     

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark Burnett -- Social (In)Security Ken Pfeil -- BabelNet Dan Kaminsky -- The art of tracking Mark Burnett -- The laws of security Ryan Russell "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Electronic books; Short stories, American; Computer security; Hackers; Computer hackers; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Short stories; Fiction; Short stories
    Umfang: Online Ressource (xxii, 303 p.), ill.
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  6. Stealing the network
    how to own the box
    Erschienen: c2003
    Verlag:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

    Zugang:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    keine Fernleihe
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    keine Fernleihe
    Saarländische Universitäts- und Landesbibliothek
    keine Fernleihe
    Universitätsbibliothek der Eberhard Karls Universität
    keine Fernleihe

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Electronic books; Short stories, American; Hackers; Computer security; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Short stories; Fiction; Short stories
    Umfang: Online Ressource (xxii, 303 p.), ill.
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

  7. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: 2003
    Verlag:  Syngress, Rockland, MA ; EBSCO Industries, Inc., Birmingham, AL, USA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

    Bibliothek der Hochschule Mainz, Untergeschoss
    keine Fernleihe

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions. "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser.
    Umfang: 1 Online-Ressource (xxii, 303 pages), Illustrations
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

  8. Stealing the network
    how to own the box
    Autor*in: Russell, Ryan
    Erschienen: 2003
    Verlag:  Syngress, Rockland, MA

    Zugang:
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Schriftenreihe: Cyber-Fiction Ser.
    Umfang: 1 online resource (xxii, 303 pages), Illustrations
    Bemerkung(en):

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    Online-Ausg.:

  9. Stealing The Network
    How to Own the Box
    Autor*in: Syngress
    Erschienen: 2003
    Verlag:  Syngress Publishing, Burlington

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... mehr

    Hochschulbibliothek Friedensau
    Online-Ressource
    keine Fernleihe

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.Not just another

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781931836876
    Schriftenreihe: Cyber-Fiction
    Umfang: Online-Ressource (329 p.)
    Bemerkung(en):

    Description based upon print version of record

    Cover; Contents; Foreword; Chapter 1 Hide and Sneak-Ido Dubrawsky; Chapter 2 The Worm Turns-Ryan Russell and Tim Mullen; Chapter 3 Just Another Day at the Office -Joe Grand; Chapter 4 h3X's Adventures in Networkland-FX; Chapter 5 The Thief No One Saw-Paul Craig; Chapter 6 Flying the Friendly Skies-Joe Grand; Chapter 7 dis-card-Mark Burnett; Chapter 8 Social (In)Security-Ken Pfeil; Chapter 9 BabelNet-Dan Kaminsky; Chapter 10 The Art of Tracking-Mark Burnett; Appendix The Laws of Security-Ryan Russell;