Results for *

Displaying results 1 to 25 of 92.

  1. Terminal compromise
    Published: 199X
    Publisher:  Project Gutenberg, Champaign, Ill

    Hochschule für Gesundheit, Hochschulbibliothek
    eBook EBSCO
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Subjects: Computer security; Records; Records; Computer security
    Scope: Online Ressource
  2. Vulnerability Management
    Published: 2019
    Publisher:  Auerbach Publications, Milton ; O'Reilly Media Inc., Sebastopol, CA

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a... more

    Access:
    Bibliothek der Hochschule Darmstadt, Zentralbibliothek
    No inter-library loan
    Universitätsbibliothek J. C. Senckenberg, Zentralbibliothek (ZB)
    No inter-library loan
    Bibliothek der Hochschule Mainz, Untergeschoss
    No inter-library loan
    Universität Marburg, Universitätsbibliothek
    No inter-library loan

     

    Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1000011933; 9781000011937; 1000005097; 9781000005097; 0415015464; 9780415015462; 0429289650; 9780429289651
    RVK Categories: EC 1850 ; EC 1874 ; EC 2220 ; EC 2230 ; HM 1331 ; HN 1331
    Edition: 2nd ed
    Subjects: Frau; Frauenroman; Englisch; Frauenliteratur; Schriftstellerin; Weiblichkeit; Postmoderne; Ästhetik; Literatur; Information technology; Computer security; Computer security; Information technology
    Other subjects: Woolf, Virginia (1882-1941); Woolf, Virginia (1882-1941)
    Scope: 1 Online-Ressource (330 pages)
    Notes:

    Description based upon print version of record

  3. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Subjects: Computer hackers; Computer security; Cyberterrorism; Hackers
    Scope: Online-Ressource
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  4. Stealing the network
    how to own the box
    Published: 2003
    Publisher:  Syngress Pub, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix Stealing the Network: How to Own the Box is NOT intended to be a install, configure, update, troubleshoot, and defend book. It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the street fighting tactics used to attack networks and systems. Not just another hacker book, it plays on edgy market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile White Hats, Black Hats and Gray Hats Gives readers a first ever look inside some of the most notorious network intrusions

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Computer hackers; Computer security; Short stories, American; Hackers
    Scope: Online-Ressource (xxii, 303 p), ill, 24 cm
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."--Cover

    Electronic reproduction; Mode of access: World Wide Web

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  5. Hacking in the humanities
    cybersecurity, speculative fiction and navigating a digital future
    Author: Mauro, Aaron
    Published: [2022]
    Publisher:  Bloomsbury Academic, London

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Access:
    Resolving-System (lizenzpflichtig)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."--

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231016; 9781350230996; 9781350230989
    Other identifier:
    Series: Bloomsbury Studies in Digital Cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Computer security,Digital lifestyle,Media, information & communication industries,Literary studies: from c 1900 -
    Scope: 1 Online-Ressource (xii, 212 Seiten)
    Notes:

    Includes bibliographical references and index

    Preface -- 1. Human Exploits: An Introduction to Hacking and the Humanities -- 2. "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- 3. Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- 4. Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- 5.Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- 6. Biohacking and Autonomous Androids: Human Evolution and Biometric Data -- 7. Gray Hat Humanities: Surveillance Capitalism, Object Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index

  6. Encyclopedia of information ethics and security
    Published: 2008
    Publisher:  Information Science Reference, Hershey, Pa. [u.a.]

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance,... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781591409878
    RVK Categories: CC 7100 ; ST 277
    Subjects: Information technology; Information technology; Computer crimes; Computer security; Information networks
    Scope: XVII, 661, [1] - 8 S., Ill., graph. Darst.
    Notes:

    Literaturangaben

  7. Open-Source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg, Stuttgart

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Inhaltsverzeichnis (kostenfrei)
    Source: Staatsbibliothek zu Berlin
    Language: German
    Media type: Book
    Format: Print
    Series: Array ; Bd. 1
    Subjects: Open Source; Datensicherheit; Informationsmanagement; Unternehmen; Baden-Württemberg; Computer security; Computer systems; Cryptography; Open source software
    Scope: 103 S., graph. Darst., 30 cm
    Notes:

    Literaturangaben

    Enth. 3 Beitr

  8. Terminal compromise
    Published: [199-?]
    Publisher:  Project Gutenberg, Champaign, Ill

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (Deutschlandweit zugänglich)
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Subjects: Electronic books; Didactic fiction; Computer security; Records; Computer security; Records; Records; Computer security
    Notes:

    Access may be limited to NetLibrary affiliated libraries

  9. Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment
    4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Published: 2018
    Publisher:  Springer International Publishing, Cham

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in... more

    Access:
    Resolving-System (lizenzpflichtig)
    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan

     

    This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. ITAP 2018 includes a total of 84 papers. They were organized in topical sections as follows: Part I: aging and technology acceptance; aging and interaction; intergenerational communication and social participation. Part II: health care technologies and services for the elderly; intelligent environments for aging; and games and entertainment for the elderly Health Care Technologies and Services for the Elderly -- Building an Ontology for Eldercare Service in China with a Hierarchical Clustering Method -- Interoperability and Convergence for Welfare Technology -- A Knowledge Graph for Eldercare: Constructing a Domain Entity Graph with Guidelines -- Augmented Reality in Tablets for the Yerkes Test for Older Adults -- Innovation Method of Health Products Design for Elderly Adults Based on Perceived Quality and User Experience -- A User-centred Ethical Assessment of Welfare Technologies for Elderly -- Obstacles of Utilizing a Self-management APP for Taiwanese Type II Diabetes Patients -- Impact of Virtual Reality (VR) Experience on Older Adults' Well-Being -- Positive Impact of Exergaming on Older Adults’ Mental and Social Well-being: In Search of Evidence -- AR-PETS: Development of an Augmented Reality Supported Pressing Evaluation Training System -- Technology-Enabled Medication Adherence for Seniors Living in the Community: Experiences, Lessons, and The Road Ahead -- The Old People Using Intelligent Mobile Equipment Influence Extent -- Factor Analysis of Perceived Quality and User Experience of Health Products for Elderly Adults -- Usability Assessment of a Web-based Self-Directed Learning (SDL) System for Chinese Dementia Caregivers -- The Effect of Hypertension Health Management (HHM) using IT for the Elderly: A Case Study in an Underdeveloped Area of China -- Decisions about Medical Data Disclosure in the Internet: An Age Perspective -- Intelligent Environments for Aging -- A Framework for Pervasive & Ubiquitous Geriatric Monitoring -- User-specific Concepts of Aging - A Qualitative Approach on AAL-Acceptance Regarding Ultrasonic Whistles -- Kinecting Frailty: A Pilot Study on Frailty -- Detecting Parkinson’s Disease Using Gait Analysis with Particle Swarm Optimization -- Methods to Design Home Support for Elders -- Unobtrusive detection of frailty in older adults -- Monitoring Thermal Comfort with IoT Technologies: A Pilot Study in Chinese Eldercare Centers -- Reflections on the effectiveness of a high density ambient sensor deployment for monitoring Healthy Aging -- Interpersonal Distancing in Cooperation - Effect of Confederate’s Interpersonal Distance Preferences -- Identifying Elderlies at Risk of Becoming More Depressed with Internet-of-Things -- Smart TV for Older Adults: A Comparative Study of the Mega Menu and Tiled Menu -- Privacy at Home: an Inquiry into Sensors and Robots for the Stay at Home Elderly -- Perspectives on Design of Sensor based Exergames Targeted Towards Older Adults -- Privacy and Future Consent in Smart Homes as Assisted Living Technologies -- Needs and Attitudes of Friendly Chinese Restaurant among Older Adults: Results from a Pilot Study -- Investigating Older Adults’ Preferences for Functions within a Human-Machine Interface Designed for Fully Autonomous Vehicles -- An Experimental Study on Intelligent Kitchen Appliances’ Interface Information Preference Based on Visual Characteristics of the Elderly -- Games and Entertainment for the Elderly -- Gen X and Digital Games: Looking Back to Look Forward -- An analysis of Crossword Learning: a mobile application for the elderly -- Creating an Online Escape Room Game for Older Adults: Needs Assessment, Design Process, and Usability Testing -- Innovative game concepts for Alzheimer patients -- Pumpkin Garden: A Mobile Game Platform for Monitoring Parkinson's Disease Symptoms -- Pilot study of Piano Learning with AR Smart glasses Considering Both Single and Paired Play -- Attitudes and Perceptions of Older Chinese People in Hong Kong towards Silver Gaming

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Zhou, Jia (HerausgeberIn); Salvendy, Gavriel (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9783319920375
    Other identifier:
    Series: Lecture Notes in Computer Science ; 10927
    Information Systems and Applications, incl. Internet/Web, and HCI ; 10927
    Array
    Subjects: Computer science; Computer Science; Computer science; Computer organization; Computer security; User interfaces (Computer systems); Artificial intelligence; Computer graphics; Computer organization; Computer security; User interfaces (Computer systems); Artificial intelligence; Computer graphics; Application software.
    Scope: Online-Ressource (XXIII, 590 p. 180 illus, online resource)
  10. Terminal compromise
    Published: [199-?]
    Publisher:  Project Gutenberg, Champaign, Ill

    Evangelische Hochschule Berlin, Bibliothek
    eBook
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Hochschule für Gesundheit, Hochschulbibliothek
    eBook EBSCO
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Clausthal
    No inter-library loan
    Hochschule Emden/Leer, Hochschulbibliothek
    No inter-library loan
    Deutscher Caritasverband e.V., Bibliothek
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Universitätsbibliothek Freiburg
    No inter-library loan
    Zeppelin Universität gGmbH, Bibliothek
    No inter-library loan
    Universitätsbibliothek Greifswald
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    ebook
    No inter-library loan
    Bibliothek der Hochschule Hannover
    No inter-library loan
    Bibliothek im Kurt-Schwitters-Forum
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Heidelberg
    E-Book Ebsco
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    No inter-library loan
    HTWG Hochschule Konstanz Technik, Wirtschaft und Gestaltung, Bibliothek
    eBook NetLibrary
    No inter-library loan
    Hochschule Magdeburg-Stendal, Hochschulbibliothek
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek
    ebook netlibfree
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    ebook netlibfree
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mannheim, Bibliothek
    eBook Ebsco
    No inter-library loan
    Hochschule Mannheim, Hochschulbibliothek
    eBook NL
    No inter-library loan
    Universitätsbibliothek Mannheim
    No inter-library loan
    Hochschulbibliothek Friedensau
    Online-Ressource
    No inter-library loan
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook EBSCO
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book EBSCO
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Duale Hochschule Baden-Württemberg Ravensburg, Bibliothek
    E-Book EBSCO
    No loan of volumes, only paper copies will be sent
    Hochschulbibliothek Reutlingen (Lernzentrum)
    eBook
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan
    Hochschule Schmalkalden, Cellarius Bibliothek
    No inter-library loan
    Pädagogische Hochschule, Bibliothek
    No inter-library loan
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No inter-library loan
    Hochschule Magdeburg-Stendal, Standort Stendal, Bibliothek
    No inter-library loan
    Hochschule der Medien, Bibliothek Standort Nobelstr.
    E-Book/Nationallizenz
    No inter-library loan
    Hochschule für Technik Stuttgart, Bibliothek
    Ebsco eBook
    No inter-library loan
    Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim
    No loan of volumes, only paper copies will be sent
    Technische Hochschule Ulm, Bibliothek
    eBook
    No inter-library loan
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    No inter-library loan
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    EBSCO eBooks
    No inter-library loan
    Deutsches Historisches Institut Washington, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    UB Weimar
    No inter-library loan
    Hochschulbibliothek Weingarten
    eBooks NetLibrary
    No inter-library loan
    EBS Universität für Wirtschaft und Recht, Learning Center, Standort Wiesbaden, Fachbibliothek Rechtswissenschaften
    E-Book
    No inter-library loan
    Herzog August Bibliothek Wolfenbüttel
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (Deutschlandweit zugänglich)
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Subjects: Electronic books; Didactic fiction; Computer security; Records; Computer security; Records; Records; Computer security
    Notes:

    Access may be limited to NetLibrary affiliated libraries

  11. Stealing the network
    how to own the box
    Published: ©2003
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer security; Short stories, American; Electronic books
    Scope: 1 Online-Ressource (xxii, 303 pages)
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    Hide and sneak - Ido Dubrawsky -- - The worm turns - Ryan Russell and Tim Mullen -- - Just another day at the office - Joe Grand -- - h3X's adventures in networkland - FX -- - The thief no one saw - Paul Craig -- - Flying the friendly skies - Joe Grand -- - dis-card - Mark Burnett -- - Social (In)Security - Ken Pfeil -- - BabelNet - Dan Kaminsky -- - The art of tracking - Mark Burnett -- - The laws of security - Ryan Russell

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  12. Stealing the network
    how to own a shadow
    Author: Long, Johnny
    Published: c2007
    Publisher:  Syngress, Rockland, Mass.

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0080517757; 1429456485; 9780080517759; 9781429456487
    Series: Stealing the Network Ser
    Subjects: Hackers; Computer security; Cyberterrorism; Hackers; Computer security; Cyberterrorism
    Scope: 1 Online-Ressource (xxxvi, 409 p.)
    Notes:

    "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet

  13. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Scope: 1 Online-Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    Control yourself - Ryan Russell -- - The lagos creeper - 131ah -- - Product of fate: the evolution of a hacker - Russ Rogers -- - A real gullible genius - Jay Beale -- - For whom Ma Bell tolls - Joe Grand -- - Return on investment - Fyodor -- - h3X and the big picture - FX -- - The story of Dex - Paul Craig -- - Automatic terror machine - Tim Mullen -- - Get out quick - Ryan Russell

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  14. Futureproof
    Security Aesthetics and the Management of Life
    Contributor: Ghertner, D. Asher (Publisher); Goldstein, Daniel M. (Publisher); McFann, Hudson (Publisher)
    Published: [2020]; © 2020
    Publisher:  Duke University Press, Durham

    Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard... more

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    TH-AB - Technische Hochschule Aschaffenburg, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Augsburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bayreuth
    Unlimited inter-library loan, copies and loan
    Hochschule Coburg, Zentralbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Kempten, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Landshut, Hochschule für Angewandte Wissenschaften, Bibliothek
    Unlimited inter-library loan, copies and loan
    Bayerische Staatsbibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Passau
    Unlimited inter-library loan, copies and loan

     

    Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border, Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.Contributors. Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Contributor: Ghertner, D. Asher (Publisher); Goldstein, Daniel M. (Publisher); McFann, Hudson (Publisher)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478007517
    Other identifier:
    Series: Global Insecurities
    Subjects: SOCIAL SCIENCE / Anthropology / Cultural & Social; Biosecurity; Computer security; Emergency management; Human security; Risk management; Risikomanagement; Menschliche Sicherheit; Katastrophenmanagement; Zukunft; Ästhetik
    Scope: 1 Online-Ressource (xii, 298 Seiten)
  15. Women in security
    changing the face of technology and innovation
    Contributor: Christofferson, Debra A. (Publisher)
    Published: [2018]; © 2018
    Publisher:  Springer, Cham

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Augsburg
    Unlimited inter-library loan, copies and loan
    Hochschulbibliothek Ingolstadt
    Unlimited inter-library loan, copies and loan
    Hochschule Kempten, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Landshut, Hochschule für Angewandte Wissenschaften, Bibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule München, Bibliothek
    Unlimited inter-library loan, copies and loan
    Technische Universität München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Universität der Bundeswehr München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Nürnberg Georg Simon Ohm, Bibliothek
    No loan of volumes, only paper copies will be sent
    OTH- Ostbayerische Technische Hochschule Regensburg, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschulbibliothek Rosenheim
    No loan of volumes, only paper copies will be sent
    Hochschule für angewandte Wissenschaften Würzburg-Schweinfurt, Abteilungsbibliothek Schweinfurt
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Würzburg-Schweinfurt Bibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
  16. Stealing the network
    how to own a continent
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Subjects: FICTION / General; Computer security; Cyberterrorism; Hackers; Computer security; Hackers; Cyberterrorism
    Scope: 1 online resource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

  17. Stealing the network
    how to own the box
    Published: © 2003
    Publisher:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: FICTION / General; Hackers; Computer security; Short stories, American; Electronic books; Electronic book collection; Hackers; Computer security; Short stories, American
    Scope: 1 online resource (xxii, 303 pages), illustrations
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

  18. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098; 9780080543925; 0080543928
    Series: Cyber-Fiction Ser
    Subjects: FICTION / General; Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 online resource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

  19. Stealing the network
    how to own a shadow
    Author: Long, Johnny
    Published: 2007
    Publisher:  Syngress, Rockland, MA

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1597490814; 9781597490818
    Subjects: Computer hackers; Computer security; Cyberterrorism
    Scope: xxxvi, 409 p.
    Notes:

    "Black Hat"--Cover. - "... fourth book in the "Stealing the network series."--Preface. - "The chase for Knuth"--Cover

  20. Y2K
    Published: 2000
    Publisher:  Overlook Press, Woodstock, N.Y. [u.a.]

    Universitätsbibliothek Erlangen-Nürnberg, Hauptbibliothek
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Regensburg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    ISBN: 1585670251
    RVK Categories: HU 9800
    Edition: 1. ed.
    Subjects: Computer crimes; Computer hackers; Computer security
    Scope: 107 S.
  21. Core security patterns
    best practices and strategies for J2EE, web services and identity management
    Published: 2005
    Publisher:  Prentice Hall, Upper Saddle River, NJ ; Munich [u.a.]

    Universitätsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    ISBN: 0131463071
    RVK Categories: ST 253 ; ST 250
    Edition: 1. print.
    Series: Prentice Hall core series
    Subjects: J2EE; Java 2 platform Enterprise Edition; Java 2; datasikkerhed; programmering; programmeringssprog; sikkerhed; vejledninger; Java (Computer program language); Computer security
    Scope: XLVI, 1041 S.
    Notes:

    Includes bibliographical references and index

  22. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Hackers; Computer networks; Computer security; Hackers; Computer networks; Hackers; Computer networks ; Security measures; Computer security; FICTION ; General; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

  23. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX --The story of Dex /Paul Craig --Automatic terror machine /Tim Mullen --Get out quick /Ryan Russell. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788
    Subjects: Computer security; Hackers; Cyberterrorism; Computer security; Hackers; Cyberterrorism; Computer security; Cyberterrorism; Hackers; Fiction; Short stories; Suspense fiction; Short stories; FICTION ; General
    Scope: Online Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

  24. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Hackers; Computer security; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Short stories; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

  25. Stealing the network
    how to own a continent
    Published: 2004
    Publisher:  Syngress, Rockland, Mass

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX --... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan

     

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX -- The story of Dex Paul Craig -- Automatic terror machine Tim Mullen -- Get out quick Ryan Russell This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781931836050; 1931836051; 9781932266788; 193226678X
    Subjects: Computer hackers; Computer security; Cyberterrorism; Cyberterrorism; Computer security; Hackers; Computer hackers; FICTION ; General; Computer security; Cyberterrorism; Hackers; Fiction; Short stories; Suspense fiction; Short stories
    Scope: Online Ressource (402 p.), ill., ports.
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black hat, Inc"--Cover. - Description based on print version record

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick