Results for *

Displaying results 1 to 25 of 45.

  1. Neuromancer
    Published: 1984
    Publisher:  Ace Books, New York

    Universitätsbibliothek Braunschweig
    Pg-2.050
    No inter-library loan
    UB Weimar
    128 301
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0441569595
    Subjects: Hackers; Business intelligence; Information superhighway; Nervous system; Conspiracies
    Scope: 271 p, 18 cm
  2. Stealing the network
    how to own the box
    Published: ©2003
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer security; Short stories, American
    Other subjects: Short stories
    Scope: 1 Online-Ressource (xxii, 303 pages)
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  3. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Fiction; Suspense fiction; Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Other subjects: Short stories
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  4. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Fiction; Computer hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  5. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  6. Respawn
    gamers, hackers, and technogenic life
    Published: 2018; ©2018
    Publisher:  Duke University Press, Durham

    Examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of... more

    Universitätsbibliothek Regensburg
    Unlimited inter-library loan, copies and loan

     

    Examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, the author illustrates how they impact the lives of gamers and nongamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. providing an essential walk-through guide to our digital culture and its high-tech controversies, the author shows how games and playable media spawn new modes of engagement in a computerized world

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1478090367; 9781478090366
    RVK Categories: AP 15963
    Edition: [Open access version]
    Series: Experimental futures
    Subjects: Video Games; Jeux vidéo; Pirates informatiques; Aktivismus; Computerspiel; GAMES; Hacker; Hackers; Technology; video games; Video games; Hackers; Technology; Video games; Hacker; Aktivismus; Computerspiel
    Other subjects: Electronic books
    Scope: 1 Online-Ressource
  7. Respawn
    gamers, hackers, and technogenic life
    Published: 2018
    Publisher:  Duke University Press, Durham

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point more

     

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478002789; 1478002786
    Other identifier:
    RVK Categories: AP 15963
    Series: Experimental futures : technological lives, scientific arts, anthropological voices
    Subjects: Video games; Hackers; Technology / Social aspects; Hacker; Aktivismus; Computerspiel
    Scope: 1 Online-Ressource (301 pages), illustrations
    Notes:

    Includes bibliographical references and index. - Description based on print version record

  8. Respawn
    gamers, hackers, and technogenic life
    Published: [2018]
    Publisher:  Duke University Press, Durham

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781478002789; 9781478001348
    Series: Experimental futures : technological lives, scientific arts, anthropological voices
    Subjects: Video games; Hackers; Technology
    Scope: 301 Seiten, Illustrationen
    Notes:

    Includes bibliographical references and index

  9. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Subjects: Computer hackers; Computer security; Cyberterrorism; Hackers
    Scope: Online-Ressource
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  10. Stealing the network
    how to own the box
    Published: 2003
    Publisher:  Syngress Pub, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix Stealing the Network: How to Own the Box is NOT intended to be a install, configure, update, troubleshoot, and defend book. It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the street fighting tactics used to attack networks and systems. Not just another hacker book, it plays on edgy market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile White Hats, Black Hats and Gray Hats Gives readers a first ever look inside some of the most notorious network intrusions

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Computer hackers; Computer security; Short stories, American; Hackers
    Scope: Online-Ressource (xxii, 303 p), ill, 24 cm
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."--Cover

    Electronic reproduction; Mode of access: World Wide Web

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  11. Respawn
    gamers, hackers, and technogenic life
    Published: 2018
    Publisher:  Duke University Press, Durham ; London

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Hochschulbibliothek Ansbach
    Unlimited inter-library loan, copies and loan
    Staatliche Bibliothek, Schloßbibliothek
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bamberg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Bayreuth
    Unlimited inter-library loan, copies and loan
    Landesbibliothek Coburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Eichstätt-Ingolstadt
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Erlangen-Nürnberg, Hauptbibliothek
    Unlimited inter-library loan, copies and loan
    Kunsthistorisches Institut in Florenz, Max-Planck-Institut, Bibliothek
    Hochschule Weihenstephan-Triesdorf, Zentralbibliothek
    No loan of volumes, only paper copies will be sent
    Hochschulbibliothek Ingolstadt
    Unlimited inter-library loan, copies and loan
    Hochschule Kempten, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Hochschule Landshut, Hochschule für Angewandte Wissenschaften, Bibliothek
    Unlimited inter-library loan, copies and loan
    Bayerische Staatsbibliothek
    Unlimited inter-library loan, copies and loan
    Deutsches Museum, Bibliothek
    No loan of volumes, only paper copies will be sent
    Hochschule München, Bibliothek
    Unlimited inter-library loan, copies and loan
    Landesamt für Digitalisierung, Breitband und Vermessung, Bibliothek
    No inter-library loan
    Technische Universität München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Universität München, Universitätsbibliothek, Teilbibliotheken Garching
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek der LMU München
    Unlimited inter-library loan, copies and loan
    Zentralinstitut für Kunstgeschichte, Bibliothek
    No loan of volumes, only paper copies will be sent
    Hochschule für angewandte Wissenschaften Neu-Ulm, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Universität der Bundeswehr München, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Technische Hochschule Nürnberg Georg Simon Ohm, Bibliothek
    No loan of volumes, only paper copies will be sent
    Deutsches Forum für Kunstgeschichte, Bibliothek
    Universitätsbibliothek Passau
    Unlimited inter-library loan, copies and loan
    Leibniz-Institut für Ost- und Südosteuropaforschung, Bibliothek
    No loan of volumes, only paper copies will be sent
    OTH- Ostbayerische Technische Hochschule Regensburg, Hochschulbibliothek
    Unlimited inter-library loan, copies and loan
    Staatliche Bibliothek Regensburg
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Regensburg
    Unlimited inter-library loan, copies and loan
    Bibliotheca Hertziana - Max-Planck-Institut für Kunstgeschichte
    Universitätsbibliothek Würzburg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Source: Union catalogues
    Language: English
    Media type: Book
    ISBN: 9781478001348; 9781478002925
    RVK Categories: AP 15963
    Series: Experimental futures
    Subjects: Video games; Hackers; Technology; Computerspiel; Hacker; Aktivismus
    Scope: 301 Seiten, Illustrationen
    Notes:

    Includes bibliographical references and index

  12. Stealing the network
    how to own the box
    Published: ©2003
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836876; 1932266682; 9781931836876; 9781932266689
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer security; Short stories, American; Electronic books
    Scope: 1 Online-Ressource (xxii, 303 pages)
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

    Hide and sneak - Ido Dubrawsky -- - The worm turns - Ryan Russell and Tim Mullen -- - Just another day at the office - Joe Grand -- - h3X's adventures in networkland - FX -- - The thief no one saw - Paul Craig -- - Flying the friendly skies - Joe Grand -- - dis-card - Mark Burnett -- - Social (In)Security - Ken Pfeil -- - BabelNet - Dan Kaminsky -- - The art of tracking - Mark Burnett -- - The laws of security - Ryan Russell

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions

    "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

  13. Stealing the network
    how to own a shadow
    Author: Long, Johnny
    Published: c2007
    Publisher:  Syngress, Rockland, Mass.

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0080517757; 1429456485; 9780080517759; 9781429456487
    Series: Stealing the Network Ser
    Subjects: Hackers; Computer security; Cyberterrorism; Hackers; Computer security; Cyberterrorism
    Scope: 1 Online-Ressource (xxxvi, 409 p.)
    Notes:

    "Black Hat"--Cover. - " ... fourth book in the "Stealing the network series."--Pref. - "The chase for Knuth"--Cover

    Cover; Title; Authors & Creators; Preface; Foreword; Travel Plans; Back in the Saddle; Old Man and a Ghost; Rootkit; Paul; The Birth of Pawn; Dishonorable Discharge; McGaylver; Appendix: Flashback to Knuth; There's Something Else; The Chase

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet

  14. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Scope: 1 Online-Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    Control yourself - Ryan Russell -- - The lagos creeper - 131ah -- - Product of fate: the evolution of a hacker - Russ Rogers -- - A real gullible genius - Jay Beale -- - For whom Ma Bell tolls - Joe Grand -- - Return on investment - Fyodor -- - h3X and the big picture - FX -- - The story of Dex - Paul Craig -- - Automatic terror machine - Tim Mullen -- - Get out quick - Ryan Russell

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  15. Stealing the network
    how to own a continent
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Subjects: FICTION / General; Computer security; Cyberterrorism; Hackers; Computer security; Hackers; Cyberterrorism
    Scope: 1 online resource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

  16. Stealing the network
    how to own the box
    Published: © 2003
    Publisher:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: FICTION / General; Hackers; Computer security; Short stories, American; Electronic books; Electronic book collection; Hackers; Computer security; Short stories, American
    Scope: 1 online resource (xxii, 303 pages), illustrations
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword

  17. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098; 9780080543925; 0080543928
    Series: Cyber-Fiction Ser
    Subjects: FICTION / General; Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 online resource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

  18. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Hackers; Computer networks; Computer security; Hackers; Computer networks; Hackers; Computer networks ; Security measures; Computer security; FICTION ; General; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

  19. Respawn
    gamers, hackers, and technogenic life
    Published: [2018]
    Publisher:  Duke University Press, Durham

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    10 A 71597
    Unlimited inter-library loan, copies and loan

     

    Introduction: all your base -- May the lulz be with you -- Obstinate systems -- Still inside -- Long live play -- We are heroes -- Green machine -- Pwn -- Conclusion: save point

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781478002789; 9781478001348
    Series: Experimental futures : technological lives, scientific arts, anthropological voices
    Subjects: Video games; Hackers; Technology
    Scope: 301 Seiten, Illustrationen
    Notes:

    Includes bibliographical references and index

  20. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction
    Subjects: Computer hackers; Computer networks; Computer networks; Computer security; Hackers
    Scope: Online-Ressource (xxii, 339 p), 24 cm
    Notes:

    "Foreword by David Litchfield

    "Rob Shein aka Rogue Shoten

    Electronic reproduction; Mode of access: World Wide Web

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  21. Snow crash
    a novel
    Published: 2022; ©2022
    Publisher:  Penguin Books, Great Britain

    The 30th anniversary edition of the modern classic that popularised the term 'metaverse', exploring (in an eerily prescient way) computer science, the advance of technology, wealth inequality, politics and philosophy. In the Metaverse - cyberspace... more

    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    HU 9800 002 2022
    Unlimited inter-library loan, copies and loan

     

    The 30th anniversary edition of the modern classic that popularised the term 'metaverse', exploring (in an eerily prescient way) computer science, the advance of technology, wealth inequality, politics and philosophy. In the Metaverse - cyberspace home to avatars and software daemons - there is a new drug available- Snow Crash. A cyberdrug that reduces avatars in the digital world to dust, it also infects users in real life, leaving them in a vegetative state. This is bad news for Hiro, a freelance hacker and the Metaverse's best swordfighter, and mouthy skateboard courier Y. T. Together, investigating the Infocalypse, they trace back the roots of language itself to an ancient Sumerian priesthood and find they must race to stop a shadowy virtual villain hell-bent on world domination

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9780241629833
    RVK Categories: HU 9800 ; QD 250 ; MS 7965
    Edition: 30th anniversary edition
    Subjects: Computer viruses; Cyberpunk culture; Cyberspace; Virtual reality; Hackers; Mythology, Sumerian; Virus informatiques - Romans, nouvelles, etc; Cyberpunk (Mouvement) - Romans, nouvelles, etc; Cyberespace - Romans, nouvelles, etc; Réalité virtuelle - Romans, nouvelles, etc; Pirates informatiques - Romans, nouvelles, etc; Mythologie sumérienne - Romans, nouvelles, etc; Computer viruses; Cyberpunk culture; Cyberspace; Hackers; Mythology, Sumerian; Virtual reality; Fiction; Science fiction
    Scope: VIII, 565 Seiten, Illustrationen
    Notes:

    "Originally published in slightly different form in the United States by Bantam Spectra, an imprint of Random House, a division of Penguin Random House LLC, in 1992"--Title page verso

    Includes a foreword and a new, prequel chapter by the author

    Zusätzlich auf dem Umschlag: 'Fast-forward free-style mall mythology for the 21st century' William Gibson

  22. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Hackers; Computer security; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

  23. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX --The story of Dex /Paul Craig --Automatic terror machine /Tim Mullen --Get out quick /Ryan Russell. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788
    Subjects: Computer security; Hackers; Cyberterrorism; Computer security; Hackers; Cyberterrorism; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories; FICTION ; General
    Scope: Online Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

  24. Stealing the network
    how to own a continent
    Published: 2004
    Publisher:  Syngress, Rockland, Mass

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX --... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX -- The story of Dex Paul Craig -- Automatic terror machine Tim Mullen -- Get out quick Ryan Russell This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781931836050; 1931836051; 9781932266788; 193226678X
    Subjects: Computer hackers; Computer security; Cyberterrorism; Cyberterrorism; Computer security; Hackers; Computer hackers; FICTION ; General; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories
    Scope: Online Ressource (402 p.), ill., ports.
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black hat, Inc"--Cover. - Description based on print version record

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  25. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark Burnett -- Social (In)Security Ken Pfeil -- BabelNet Dan Kaminsky -- The art of tracking Mark Burnett -- The laws of security Ryan Russell "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Computer security; Hackers; Computer hackers; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security