Filtern nach
Letzte Suchanfragen

Ergebnisse für *

Zeige Ergebnisse 1 bis 7 von 7.

  1. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... mehr

    Technische Universität Hamburg, Universitätsbibliothek
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Schlagworte: Computer hackers; Computer security; Cyberterrorism; Hackers
    Umfang: Online-Ressource
    Bemerkung(en):

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  2. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Schlagworte: Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    Control yourself - Ryan Russell -- - The lagos creeper - 131ah -- - Product of fate: the evolution of a hacker - Russ Rogers -- - A real gullible genius - Jay Beale -- - For whom Ma Bell tolls - Joe Grand -- - Return on investment - Fyodor -- - h3X and the big picture - FX -- - The story of Dex - Paul Craig -- - Automatic terror machine - Tim Mullen -- - Get out quick - Ryan Russell

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  3. Stealing the network
    how to own a continent
    Erschienen: © 2004
    Verlag:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... mehr

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (URL des Erstveröffentlichers)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Schlagworte: FICTION / General; Computer security; Cyberterrorism; Hackers; Computer security; Hackers; Cyberterrorism
    Umfang: 1 online resource
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

  4. Stealing the network
    how to own a continent
    Erschienen: c2004
    Verlag:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    uneingeschränkte Fernleihe, Kopie und Ausleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Schlagworte: Fiction; Suspense fiction; Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Weitere Schlagworte: Short stories
    Umfang: 1 Online-Ressource (1 online resource)
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  5. Stealing the network
    how to own a continent
    Erschienen: 2004
    Verlag:  Syngress, Rockland, Mass

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX --... mehr

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    keine Fernleihe
    Universitätsbibliothek Braunschweig
    keine Fernleihe
    Zentrale Hochschulbibliothek Lübeck
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    keine Fernleihe
    Universitätsbibliothek Rostock
    keine Fernleihe

     

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX -- The story of Dex Paul Craig -- Automatic terror machine Tim Mullen -- Get out quick Ryan Russell This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Hinweise zum Inhalt
    Volltext (lizenzpflichtig)
    Quelle: Verbundkataloge
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 9781931836050; 1931836051; 9781932266788; 193226678X
    Schlagworte: Computer hackers; Computer security; Cyberterrorism; Cyberterrorism; Computer security; Hackers; Computer hackers; FICTION ; General; Computer security; Cyberterrorism; Hackers; Fiction; Short stories; Suspense fiction; Short stories
    Umfang: Online Ressource (402 p.), ill., ports.
    Bemerkung(en):

    "Foreword by Jeff Moss, President & CEO, Black hat, Inc"--Cover. - Description based on print version record

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  6. Stealing the network
    how to own a continent
    Erschienen: 2004
    Verlag:  Syngress, Rockland, MA ; EBSCO Industries, Inc., Birmingham, AL, USA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... mehr

    Bibliothek der Hochschule Mainz, Untergeschoss
    keine Fernleihe

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world. Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised.

     

    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Beteiligt: 131ah; Russell, Ryan
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Umfang: 1 Online-Ressource
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004)

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Includes bibliographical references

  7. Stealing the network
    how to own a continent
    Erschienen: 2004
    Verlag:  Syngress, Rockland, MA

    Zugang:
    TU Darmstadt, Universitäts- und Landesbibliothek - Stadtmitte
    keine Fernleihe
    Export in Literaturverwaltung   RIS-Format
      BibTeX-Format
    Quelle: Verbundkataloge
    Beteiligt: 131ah; Russell, Ryan
    Sprache: Englisch
    Medientyp: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Umfang: 1 online resource.
    Bemerkung(en):

    Title from e-book title screen (viewed June 10, 2004)

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Includes bibliographical references

    Online-Ausg.: