Letzte Suchanfragen

Ergebnisse für *

Zeige Ergebnisse 1 bis 6 von 6.

  1. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: ©2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  2. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: © 2004
    Verlag:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... mehr

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098; 9780080543925; 0080543928
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: FICTION / General; Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Umfang: 1 online resource
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

  3. Zero day exploit
    countdown to darkness
    Autor*in: Shein, Rob
    Erschienen: ©2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Schriftenreihe: Cyber-Fiction Ser
    Schlagworte: Fiction; Computer hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Umfang: 1 Online-Ressource (1 online resource)
    Bemerkung(en):

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  4. Exploiting online games
    cheating massively distributed systems
    Erschienen: 2008
    Verlag:  Addison-Wesley, Upper Saddle River, NJ

    Why games -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bots -- Reversing -- Advanced game hacking fu -- Software security uber alles -- Index mehr

    Technische Universität München, Universitätsbibliothek, Teilbibliotheken Garching
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    Why games -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bots -- Reversing -- Advanced game hacking fu -- Software security uber alles -- Index

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Buch (Monographie)
    ISBN: 9780132271912; 0132271915
    Weitere Identifier:
    9780132271912
    RVK Klassifikation: ST 230 ; ST 277
    Schriftenreihe: Addison-Wesley Software security series
    Schlagworte: Computer networks / Security measures; Computerspiel; Computersicherheit
    Umfang: XXXV, 340 S., Ill., graph. Darst.
    Bemerkung(en):

    Includes index

  5. Protocol
    how control exists after decentralization
    Erschienen: [2004]; © 2004
    Verlag:  The MIT Press, Cambridge, Massachusetts ; London, England

    How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding... mehr

    Europa-Universität Viadrina, Universitätsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Filmuniversität Babelsberg KONRAD WOLF, Universitätsbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and cultures. Instead of relying on established theoretical approaches, Galloway finds a new way to write about digital media, drawing on his backgrounds in computer programming and critical theory. "Discipline-hopping is a necessity when it comes to complicated socio-technical topics like protocol," he writes in the preface.Galloway begins by examining the types of protocols that exist, including TCP/IP, DNS, and HTML. He then looks at examples of resistance and subversion--hackers, viruses, cyberfeminism, Internet art--which he views as emblematic of the larger transformations now taking place within digital culture. Written for a nontechnical audience, Protocol serves as a necessary counterpoint to the wildly utopian visions of the Net that were so widespread in earlier days.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
  6. Exploiting online games
    cheating massively distributed systems
    Erschienen: 2008
    Verlag:  Addison-Wesley, Upper Saddle River, NJ

    Why games -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bots -- Reversing -- Advanced game hacking fu -- Software security uber alles -- Index mehr

    Technische Hochschule Brandenburg, Hochschulbibliothek
    uneingeschränkte Fernleihe, Kopie und Ausleihe

     

    Why games -- Game hacking 101 -- Money -- Enter the lawyers -- Infested with bugs -- Hacking game clients -- Building a bots -- Reversing -- Advanced game hacking fu -- Software security uber alles -- Index

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Buch (Monographie)
    ISBN: 9780132271912; 0132271915
    Weitere Identifier:
    9780132271912
    RVK Klassifikation: ST 230 ; ST 277
    Schriftenreihe: Addison-Wesley Software security series
    Schlagworte: Computer networks / Security measures; Computerspiel; Computersicherheit
    Umfang: XXXV, 340 S., Ill., graph. Darst.
    Bemerkung(en):

    Includes index