Narrow Search
Last searches

Results for *

Displaying results 51 to 75 of 130.

  1. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction
    Subjects: Computer hackers; Computer networks; Computer networks; Computer security; Hackers
    Scope: Online-Ressource (xxii, 339 p), 24 cm
    Notes:

    "Foreword by David Litchfield

    "Rob Shein aka Rogue Shoten

    Electronic reproduction; Mode of access: World Wide Web

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  2. Information warfare in business
    strategies of control and resistance in the network society
    Author: Munro, Iain
    Published: 2005
    Publisher:  Routledge, London

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    V m 650
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0415339685; 0415439906; 9780415339681; 9780415439909
    RVK Categories: ST 277
    Series: Routledge studies in business organization and networks
    Subjects: Information technology; Information warfare; Business intelligence; Computer security
    Scope: xi, 200 p, 24cm
  3. Hacking exposed J2EE & JAVA
    developing secure applications with JAVA technology
    Published: 2002
    Publisher:  McGraw-Hill/Osborne, New York, NY [u.a.]

    Bibliothek der Hochschule Hannover
    EDV 3210-JAV /785
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 04 B 1682
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 T238
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0072225653
    Subjects: Computer security; Software protection; Internet; Java (Computer program language)
    Scope: xxviii, 426 p, ill, 24 cm
  4. Open-Source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg, Stuttgart

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 B 99235
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    RS 6131(1)
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    B08-1358
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: German
    Media type: Book
    Format: Print
    Series: Array ; Bd. 1
    Subjects: Open Source; Datensicherheit; Informationsmanagement; Unternehmen; Baden-Württemberg; Computer security; Computer systems; Cryptography; Open source software
    Scope: 103 S., graph. Darst., 30 cm
    Notes:

    Literaturangaben

    Enth. 3 Beitr

  5. Encyclopedia of information ethics and security
    Published: 2008
    Publisher:  Information Science Reference, Hershey, Pa. [u.a.]

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance,... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 B 113888
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    AP 18420 Q6
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    2007 B 1330
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 07 B 6307
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    Rb 870
    No inter-library loan
    Universitätsbibliothek Rostock
    AK 24400 Q6
    Unlimited inter-library loan, copies and loan

     

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781591409878
    RVK Categories: CC 7100 ; ST 277
    Subjects: Information technology; Information technology; Computer crimes; Computer security; Information networks
    Scope: XVII, 661, [1] - 8 S., Ill., graph. Darst.
    Notes:

    Literaturangaben

  6. Core security patterns
    best practices and strategies for J2EE , web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card]
    Published: 2006
    Publisher:  Prentice Hall PTR, Upper Saddle River, NJ [u.a.]

    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    Dat 346 JAV 293
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 2601
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 S813
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Other identifier:
    2005020502
    RVK Categories: ST 250
    Subjects: Java (Computer program language); Computer security
    Scope: XLVI, 1041 S, Ill., graph. Darst
  7. Information Retrieval and Natural Language Processing
    A Graph Theory Approach
    Published: 2023
    Publisher:  Springer Verlag, Singapore, Singapore

    This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of... more

     

    This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory.This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Cover (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9789811699979
    Edition: 1st ed. 2022
    Series: Studies in Big Data
    Subjects: Algorithms & data structures; Artificial intelligence; COMPUTERS / Artificial Intelligence; COMPUTERS / Data Processing / Speech & Audio Processing; COMPUTERS / Information Theory; COMPUTERS / Security / General; Combinatorics & graph theory; Computer security; Computersicherheit; Datenbanken; Kombinatorik und Graphentheorie; MATHEMATICS / Graphic Methods; Machine learning; Maschinelles Lernen; Natural language & machine translation; Natürliche Sprachen und maschinelle Übersetzung; Netzwerksicherheit
    Scope: 176 Seiten
    Notes:

    Part A.- Chapter 1. Graph theory basics.- Chapter 2. Graph Algorithms.- Chapter 3. Networks using graph.- Part B.- Chapter 4. Information retrieval.- Chapter 5. Text document preprocessing using graph theory.- Chapter 6. Text analytics using graph theory.- Chapter 7. Knowledge graph.- Part C.- Chapter 8. Emerging Applications and development.- Chapter 9. Conclusion and future scope.

  8. Digitale Kompetenz
    Grundlagen der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen für die Digitale Transformation
    Author: Lang, Volker
    Published: 2022
    Publisher:  Springer Vieweg, Wiesbaden

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die... more

    Access:
    Resolving-System (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book Springer
    No inter-library loan
    Hochschule Biberach, Bibliothek
    E-Book Springer
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Hochschule 21, Bibliothek
    No inter-library loan
    Technische Universität Chemnitz, Universitätsbibliothek
    No inter-library loan
    Universitätsbibliothek Clausthal
    No inter-library loan
    Hochschule für Technik und Wirtschaft Dresden, Bibliothek
    Springer Technik/Informatik 2022
    No inter-library loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    No inter-library loan
    Duale Hochschule Gera-Eisenach, Bibliothek, Campus Eisenach
    No inter-library loan
    Hochschule Emden/Leer, Hochschulbibliothek
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    Springer E-Book
    No inter-library loan
    Zentrale Hochschulbibliothek Flensburg
    No inter-library loan
    Technische Universität Bergakademie Freiberg, Bibliothek 'Georgius Agricola'
    No inter-library loan
    Universitätsbibliothek Freiburg
    No inter-library loan
    Hochschule Furtwangen University. Informatik, Technik, Wirtschaft, Medien. Campus Furtwangen, Bibliothek
    eBook Springer
    No loan of volumes, end user receives digital copy
    Duale Hochschule Gera-Eisenach, Bibliothek, Campus Gera
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    ebook
    No inter-library loan
    HafenCity Universität Hamburg, Bibliothek
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    No inter-library loan
    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliothek der Hochschule Hannover
    No inter-library loan
    Bibliothek im Kurt-Schwitters-Forum
    No inter-library loan
    Leibniz-Fachhochschule Hannover, Bibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Fachhochschule Westküste, Hochschule für Wirtschaft und Technik, Hochschulbibliothek
    No inter-library loan
    Universitätsbibliothek Heidelberg
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Springer
    No inter-library loan
    Bibliothek LIV HN Sontheim
    Springer ebook Technik/Inform
    No inter-library loan
    HAWK Hochschule für angewandte Wissenschaft und Kunst Hildesheim/Holzminden/Göttingen, Bibliothek, Elektronische Ressourcen
    No inter-library loan
    Universitätsbibliothek Ilmenau
    Online-Ressource
    No inter-library loan
    Ernst-Abbe-Hochschule Jena, Wissenschaftliche Bibliothek
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    No loan of volumes, only paper copies will be sent
    Karlsruher Institut für Technologie, KIT-Bibliothek
    No loan of volumes, only paper copies will be sent
    Karlsruher Institut für Technologie, KIT-Bibliothek
    No loan of volumes, only paper copies will be sent
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    No inter-library loan
    Bibliotheksservice-Zentrum Baden-Württemberg (BSZ)
    No inter-library loan
    HTWG Hochschule Konstanz Technik, Wirtschaft und Gestaltung, Bibliothek
    eBook Springer
    No inter-library loan
    Hochschule Anhalt , Hochschulbibliothek
    No inter-library loan
    Hochschule für Technik, Wirtschaft und Kultur Leipzig, Hochschulbibliothek
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Duale Hochschule Baden-Württemberg Lörrach, Zentralbibliothek
    eBook Springer
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Hochschule Magdeburg-Stendal, Hochschulbibliothek
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek
    eBook Springer
    No inter-library loan
    Otto-von-Guericke-Universität, Universitätsbibliothek, Medizinische Zentralbibliothek
    eBook Springer
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mannheim, Bibliothek
    eBook Springer
    No inter-library loan
    Hochschule Mannheim, Hochschulbibliothek
    eBook Springer
    No inter-library loan
    Universitätsbibliothek Mannheim
    No inter-library loan
    Universitätsbibliothek Mannheim
    No inter-library loan
    Hochschule Merseburg, Bibliothek
    No inter-library loan
    Hochschule Mittweida (FH), Hochschulbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Springer
    No inter-library loan
    Hochschule Neubrandenburg, Bibliothek
    No inter-library loan
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook Springer
    No loan of volumes, only paper copies will be sent
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book Springer
    No loan of volumes, end user receives digital copy
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Oldenburg, Bibliothek
    No inter-library loan
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Elsfleth, Bibliothek
    No inter-library loan
    Hochschule Osnabrück, Bibliothek Campus Westerberg
    No inter-library loan
    Universitätsbibliothek Osnabrück
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    eBook Springer
    No inter-library loan
    Universität Potsdam, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Ravensburg, Bibliothek
    E-Book Springer
    No inter-library loan
    Hochschulbibliothek Reutlingen (Lernzentrum)
    eBook
    No inter-library loan
    Universitätsbibliothek Rostock
    No inter-library loan
    Hochschule für Forstwirtschaft Rottenburg, Bibliothek
    No loan of volumes, only paper copies will be sent
    Hochschule für Technik und Wirtschaft des Saarlandes, Bibliothek / Bereich Goebenstraße
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    INM - Leibniz-Institut für Neue Materialien gGmbH, NTNM-Bibliothek
    e-book
    No inter-library loan
    Hochschule für Gestaltung Schwäbisch Gmünd, Bibliothek
    eBook Springer
    No inter-library loan
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    eBook Springer
    No loan of volumes, only paper copies will be sent
    Hochschule Magdeburg-Stendal, Standort Stendal, Bibliothek
    No inter-library loan
    Hochschule Stralsund, Hochschulbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Stuttgart, Bibliothek
    eBook Springer
    No inter-library loan
    Hochschule der Medien, Bibliothek Standort Nobelstr.
    eBook Springer
    No inter-library loan
    Hochschule für Technik Stuttgart, Bibliothek
    Springer eBook
    No inter-library loan
    Universitätsbibliothek Stuttgart
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No loan of volumes, only paper copies will be sent
    Technische Hochschule Ulm, Bibliothek
    eBook Springer
    No loan of volumes, only paper copies will be sent
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    No inter-library loan
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E-Book Springer
    No inter-library loan
    UB Weimar
    No inter-library loan
    Hochschulbibliothek Weingarten
    eBook Springer
    No inter-library loan
    Hochschule Harz, Hauptbibliothek, Standort Wernigerode / Harz
    No inter-library loan
    Jade Hochschule Wilhelmshaven/Oldenburg/Elsfleth, Campus Wilhelmshaven, Bibliothek
    No inter-library loan
    Hochschule Wismar, University of Applied Sciences: Technology, Business and Design, Hochschulbibliothek
    No inter-library loan
    Ostfalia Hochschule für angewandte Wissenschaften, Bibliothek
    No inter-library loan
    Hochschule Zittau / Görlitz, Hochschulbibliothek
    No inter-library loan
    Westsächsische Hochschule Zwickau, Bibliothek
    Springer E-Book
    No inter-library loan

     

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rasant zu, und Ihr tägliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen. Sie brauchen keine Vorkenntnisse über diese Technologien zu haben, denn der Autor Volker Lang führt Sie fachkundig durch das digitale Zeitalter. Er veranschaulicht die wichtigsten Konzepte und Anwendungen in zahlreichen Beispielen und Abbildungen in Digital Fluency, und am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste mit den wichtigsten Lektionen für die Umsetzung, bevor Sie zum nächsten Kapitel übergehen. Dieses Buch geht den digitalen Schlagwörtern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten. Internationale Bewertungen der englischen Ausgabe: Digital Fluency offers valuable insights for practitioners and strategists through a unique combination of historic perspective, compelling technology insights and frameworks as well as a rich list of very insightful company use cases. It is a must read for decision-makers and employees within any public and private organization who hope to navigate the challenges posed by digital transformation by leveraging digital technologies with clarity, structure and vision. — Marcell Vollmer, Partner and Director at Boston Consulting Group (BCG) Digital Fluency provides readers with the strategic frameworks and practical advice they need to fully comprehend, manage, and shape the digital future ahead of us. — Marco Iansiti, David Sarnoff Professor of Business Administration, Harvard Business School (HBS) Digital technologies are transforming our world with breath-taking speed. In a clearly written book that combines basic knowledge with practical applications, Volker Lang provides fascinating insights and valuable advice to guide corporations and individuals through the digital age. A compelling read for those of us who like to become fluent in digital innovation, strategy, and technology. — Joachim Kraege, Head of Audi Consulting, Organization and Leadership, Audi AG Dieses Buch stellt die Übersetzung einer englischsprachigen Originalausgabe dar. Die Übersetzung wurde mit Hilfe von künstlicher Intelligenz erstellt (maschinelle Übersetzung mit DeepL.com). Eine anschließende manuelle Überarbeitung erfolgte vor allem nach inhaltlichen Gesichtspunkten, so dass das Buch stilistisch von einer herkömmlichen Übersetzung abweichen kann.

     

    Export to reference management software   RIS file
      BibTeX file
  9. Digitale Kompetenz
    Grundlagen der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing und deren Anwendungen fur die Digitale Transformation
    Author: Lang, Volker
    Published: [2022]; © 2022
    Publisher:  Springer Vieweg, Wiesbaden

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer... more

    Bundesministerium der Justiz BMJ, Bibliothek
    PZ 3450.51
    No inter-library loan
    Duale Hochschule Gera-Eisenach, Bibliothek, Campus Eisenach
    54.80(Lan)/Informatik
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    U 23 B 123
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Heidelberg
    LN-U10-19811
    Unlimited inter-library loan, copies and loan
    Bibliothek LIV HN Sontheim
    QP 345 D574 L269 (2022)
    Unlimited inter-library loan, copies and loan
    Badische Landesbibliothek
    Unlimited inter-library loan, copies and loan
    Bibliothek des Bundesgerichtshofs
    No inter-library loan
    Hochschulbibliothek Karlsruhe (PH)
    Unlimited inter-library loan, copies and loan
    Berufsakademie Sachsen, Staatliche Studienakademie Leipzig, Bibliothek
    QP 345 L269
    Unlimited inter-library loan, copies and loan
    Leipziger Städtische Bibliotheken, Zentralbibliothek
    No inter-library loan

     

    Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tägliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen.Sie müssen keine Vorkenntnisse über diese vielseitigen Technologien haben, denn der Autor Volker Lang führt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einprägsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nächsten Kapitel übergehen. Dieses Buch geht den digitalen Schlagwörtern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten.Das Aufschlüsseln von Themen wie automatisiertes Fahren und intelligente Robotik mit künstlicher Intelligenz, Blockchain-basierte Kryptowährungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlässlich, um für die Zukunft der Industrie gerüstet zu sein. Unabhängig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder öffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan für alle Ihre Anforderungen an Technologie- und Innovationsstrategien.Was Sie lernen werdenSich im digitalen Zeitalter orientieren, ohne Vorkenntnisse über digitale Technologien und digitale Transformation zu benötigen Lernen Sie die beliebtesten aktuellen und zukünftigen Anwendungen von künstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit führenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um.Für wen dieses Buch bestimmt istVordenker, Führungskräfte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungsträger, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Cover (lizenzpflichtig)
    Inhaltstext (lizenzpflichtig)
    Unbekannt (lizenzpflichtig)
  10. Open-Source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Contributor: Bertschek, Irene (Hrsg.)
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg, Stuttgart

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 B 99235
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Freiburg
    TX 2009/691
    Unlimited inter-library loan, copies and loan
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Geislingen,
    INF 1.7 Ope M1G
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    RS 6131(1)
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    Z 100/ Open
    No inter-library loan
    Badische Landesbibliothek
    106 B 50666
    Unlimited inter-library loan, copies and loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    2012 E 937
    Unlimited inter-library loan, copies and loan
    Hochschule Kehl, Bibliothek
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    B08-1358
    Unlimited inter-library loan, copies and loan
    Universität Konstanz, Kommunikations-, Informations-, Medienzentrum (KIM)
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Lörrach, Zentralbibliothek
    ST 276
    No loan of volumes, only paper copies will be sent
    ZEW - Leibniz-Zentrum für Europäische Wirtschaftsforschung GmbH, Mannheim / Spezialbibliothek
    L 8/0062=1
    No loan of volumes, only paper copies will be sent
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Ravensburg, Bibliothek
    IDc 13
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Stuttgart, Bibliothek
    WAna 51
    Loan of volumes, no copies
    Hochschule der Medien, Bibliothek Standort Nobelstr.
    Hdk 9
    Unlimited inter-library loan, copies and loan
    Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim
    2748/208:1
    Unlimited inter-library loan, copies and loan
    Landesbibliographie Baden-Württemberg, Zentralredaktion
    No inter-library loan
    Macromedia Library Stuttgart
    QH 500
    No inter-library loan
    Universitätsbibliothek Stuttgart
    5Aa 1189-1
    Unlimited inter-library loan, copies and loan
    Württembergische Landesbibliothek
    55Ca/325
    Unlimited inter-library loan, copies and loan
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    QAA 680/2005 B
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Contributor: Bertschek, Irene (Hrsg.)
    Language: German
    Media type: Book
    Format: Print
    Series: Array ; Bd. 1
    Subjects: Open Source; Datensicherheit; Informationsmanagement; Unternehmen; Baden-Württemberg; Computer systems; Open source software; Computer security; Cryptography; Unternehmen; Informationstechnik; Open Source; Computer security; Computer systems; Cryptography; Open source software
    Scope: 103 S., graph. Darst.
    Notes:

    Literaturangaben

    Enth. 3 Beitr

  11. Stealing the network
    how to own the box
    Published: 2003
    Publisher:  Syngress Publ, Rockland, Mass.

    Hochschule Emden/Leer, Hochschulbibliothek
    TWZ / Ste
    No inter-library loan
    Max-Planck-Institut zur Erforschung von Kriminalität, Sicherheit und Recht, Bibliothek
    No loan of volumes, only paper copies will be sent
    Ernst-Abbe-Hochschule Jena, Wissenschaftliche Bibliothek
    54.38,198-03/10291
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 1931836876
    Other identifier:
    9781931836876
    RVK Categories: ST 276
    Series: Black hat
    Subjects: Computer hackers; Computer security; Short stories, American
    Scope: XXII, 303 S, Ill, 24cm
  12. Guidelines for the security of information systems
    Published: 1996
    Publisher:  OECD, Paris

    Bundesministerium der Justiz BMJ, Bibliothek
    S19. 42
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    6 A 24503
    Unlimited inter-library loan, copies and loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    96 A 7196
    Unlimited inter-library loan, copies and loan
    Bibliothek der Bundesanstalt für Geowissenschaften und Rohstoffe
    1997 A 87
    No loan of volumes, only paper copies will be sent
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 96 B 2992
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    K96-2223
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    B 285576
    Unlimited inter-library loan, copies and loan
    ifo Institut für Wirtschaftsforschung an der Universität München, Bibliothek
    96/686 B
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264145699
    Other identifier:
    OECD publ. No. 46557
    RVK Categories: QH 500
    Corporations / Congresses:
    Organisation for Economic Co-Operation and Development
    Subjects: Datenschutz; OECD-Staaten
    Other subjects: Array; Array; Array; Array
    Scope: 49 S
    Notes:

    Franz. Ausg. u.d.T.: Lignes directrices régissant la sécurité des systèmes d'information

    Franz. Ausg. u. d. T.: Lignes directrices régissant la sécurité des systèmes d'information

  13. Network security
    vulnerabilities and disclosure policy
    Published: 2007
    Publisher:  Centre for Economic Policy Research, London

    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    W 32 (6134)
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    RVK Categories: QB 910
    Series: Array ; 6134
    Subjects: Internet; Datensicherheit; IT-Kriminalität; Software; Auskunftspflicht; Investitionsentscheidung; Industrieökonomik; Computer security; Computer software industry; Computer software; Disclosure of information
    Scope: 31 S., graph. Darst.
  14. J2EE security for servlets, EJBs and web services
    applying theory and standards to practice
    Published: 2004
    Publisher:  Prentice Hall PTR, Upper Saddle River, NJ

    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 03 B 7793
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131402641
    Subjects: Computer security; Web services; Servlets; Java (Computer program language)
    Scope: xxvi, 426 S
  15. Norway
    information security
    Published: 2006
    Publisher:  OECD, Paris

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 A 598235
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 6510
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    B 344388
    Unlimited inter-library loan, copies and loan
    ifo Institut für Wirtschaftsforschung an der Universität München, Bibliothek
    06/97
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264025502
    RVK Categories: MS 1190 ; ST 277
    Series: OECD reviews of risk management policies
    Subjects: Datensicherheit; Norwegen; Computer security; Computer networks; Data protection; Information resources management; ICT; Computerbeveiliging
    Scope: 130 S.
    Notes:

    Zsfassung in franz. Sprache

    Enth. 5 Beitr

    Literaturverz. S. 91 - 96

  16. Core security patterns
    best practices and strategies for J2EE applications, web services, and identity management ; [a patterns catalog that includes twentythree new patterns for building end-to-end security ; security design methodology, patterns, best practices, reality checks, and defensive strategies ; applied techniques for Web services security, identy management, service provisioning, and personal identification ; comprehensive security guide to using J2SE, J2EE, J2ME, and Java Card]
    Published: 2005
    Publisher:  Prentice Hall PTR, Upper Saddle River, N.J. [u.a.]

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    A STE 37094
    No inter-library loan
    Bibliothek der Hochschule Hannover
    EDV 3210-JAV /761
    Unlimited inter-library loan, copies and loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    inf 340 jav CP 4486
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Subjects: Java (Computer program language); Computer security
    Scope: XLV, 1041 S, Ill., graph. Darst
  17. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative,... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Hackers; Computer security; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

  18. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX --The story of Dex /Paul Craig --Automatic terror machine /Tim Mullen --Get out quick /Ryan Russell. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788
    Subjects: Computer security; Hackers; Cyberterrorism; Computer security; Hackers; Cyberterrorism; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories; FICTION ; General
    Scope: Online Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

  19. Visualization of time-oriented data
    Published: 2011
    Publisher:  Springer, Dordrecht

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9780857290786
    RVK Categories: ZI 9705 ; ST 320
    Series: Human-Computer Interaction Series
    EBL-Schweitzer
    Subjects: Digital Humanities; Computer networks -- Security measures; Computer security; Human-computer interaction; Information visualization
  20. Stealing the network
    how to own a continent
    Published: 2004
    Publisher:  Syngress, Rockland, Mass

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX --... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX -- The story of Dex Paul Craig -- Automatic terror machine Tim Mullen -- Get out quick Ryan Russell This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781931836050; 1931836051; 9781932266788; 193226678X
    Subjects: Computer hackers; Computer security; Cyberterrorism; Cyberterrorism; Computer security; Hackers; Computer hackers; FICTION ; General; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories
    Scope: Online Ressource (402 p.), ill., ports.
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black hat, Inc"--Cover. - Description based on print version record

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  21. Stealing the network
    how to own the box
    Published: c2003
    Publisher:  Syngress, Rockland, MA

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    Hide and sneak Ido Dubrawsky -- The worm turns Ryan Russell and Tim Mullen -- Just another day at the office Joe Grand -- h3X's adventures in networkland FX -- The thief no one saw Paul Craig -- Flying the friendly skies Joe Grand -- dis-card Mark Burnett -- Social (In)Security Ken Pfeil -- BabelNet Dan Kaminsky -- The art of tracking Mark Burnett -- The laws of security Ryan Russell "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--P. xix

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266682; 9781932266689; 9781931836876; 1931836876
    Series: Cyber-Fiction Ser
    Subjects: Electronic books; Short stories, American; Computer security; Hackers; Computer hackers; Electronic book collection; FICTION ; General; Hackers; Computer security; Short stories, American; Fiction; Short stories
    Scope: Online Ressource (xxii, 303 p.), ill.
    Notes:

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Description based on print version record

    Ido Dubrawsky: Hide and sneak

    Ryan Russell and Tim Mullen: The worm turns

    Joe Grand: Just another day at the office

    FX: h3X's adventures in networkland

    Paul Craig: The thief no one saw

    Joe Grand: Flying the friendly skies

    Mark Burnett: dis-card

    Ken Pfeil: Social (In)Security

    Dan Kaminsky: BabelNet

    Mark Burnett: The art of tracking

    Ryan Russell.: The laws of security

  22. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Computer hackers; Computer networks; Computer networks; Computer security; Hackers; Security measures; Computer hackers; FICTION ; General; Hackers; Computer networks ; Security measures; Computer security; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  23. Hacking in the humanities
    cybersecurity, speculative fiction, and navigating a digital future
    Author: Mauro, Aaron
    Published: 2022
    Publisher:  Bloomsbury Academic, London

    What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Universitätsbibliothek Braunschweig
    2968-5367
    Unlimited inter-library loan, copies and loan
    Centre for Asian and Transcultural Studies (CATS), Abteilung Ostasien
    AZ105.M38 H33 2022
    Unlimited inter-library loan, copies and loan
    Klassik Stiftung Weimar / Herzogin Anna Amalia Bibliothek
    336034 - A
    Unlimited inter-library loan, copies and loan

     

    What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion.Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781350231023; 9781350230989
    Series: Bloomsbury studies in digital cultures
    Subjects: Computer security; Digital humanities; Scholarly electronic publishing
    Scope: xii, 206 Seiten
  24. Hacking in the Humanities
    Cybersecurity, Speculative Fiction, and Navigating a Digital Future
    Author: Mauro, Aaron
    Published: 2022; ©2022
    Publisher:  Bloomsbury Publishing Plc, London

    Cover -- Contents -- Acknowledgments -- Preface -- Human Exploits: An Introduction to Hacking and the Humanities -- The Darkest Timeline -- Don't Be Evil -- Claiming the Future -- A Mischievous Spirit -- 1 "Hack the Planet": Pop Hackers and the... more

    Access:
    Aggregator (lizenzpflichtig)
    Technische Universität Chemnitz, Universitätsbibliothek
    No inter-library loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    No inter-library loan
    Hochschulbibliothek Friedensau
    Online-Ressource
    No inter-library loan
    Hochschule für Wirtschaft und Umwelt Nürtingen-Geislingen, Bibliothek Nürtingen
    eBook ProQuest
    No inter-library loan
    Universität Ulm, Kommunikations- und Informationszentrum, Bibliotheksservices
    No inter-library loan

     

    Cover -- Contents -- Acknowledgments -- Preface -- Human Exploits: An Introduction to Hacking and the Humanities -- The Darkest Timeline -- Don't Be Evil -- Claiming the Future -- A Mischievous Spirit -- 1 "Hack the Planet": Pop Hackers and the Demands of a Real World Resistance -- Parler Tricks -- Anthological Freedom -- Street-Level Anarchy -- Polymorphic Protest Culture -- 2 Academic Attack Surfaces: Culture Jamming the Future and XML Bombs -- Prescient Pessimism -- A Jussive Mood -- sudo rm -rf / -- A Billion Laughs -- 3 Supply Chain Attacks and Knowledge Networks: Network Sovereignty and the Interplanetary Internet -- A Consensual Hallucination -- El Paquete -- Sovereign Networks -- Don't Worry, We're from the Internet -- 4 Cryptographic Agility and the Right to Privacy: Secret Writing and the Cypherpunks -- Tales from the Crypt -- The Enemy Knows the System -- Happy Birthday -- Ignoti et quasi occulti -- 5 Biohacking and the Autonomous Androids: Human Evolution and Biometric Data -- Vital Machines -- The Selfish Ledger -- Virtual Influencers -- Cindy Mayweather-ArchAndroid -- 6 Gray Hat Humanities: Surveillance Capitalism, Object-Oriented Ontology, and Design Fiction -- Selected Bibliography -- Index.

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781350231009
    Series: Bloomsbury Studies in Digital Cultures Ser.
    Subjects: Computer security; Digital humanities; Scholarly electronic publishing; Electronic books
    Scope: 1 online resource (225 pages)
    Notes:

    Description based on publisher supplied metadata and other sources

  25. Cybersicherheit und Cyber-Resilienz in den Finanzmärkten
    Published: [2022]; © 2022
    Publisher:  EIZ Publishing, Zürich

    Access:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Bundesverfassungsgericht, Bibliothek
    Online-Ressource
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    No inter-library loan
    Deutsche Universität für Verwaltungswissenschaften Speyer, Universitätsbibliothek
    Open Access - Ohne Regalstandort
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: German
    Media type: Ebook
    Format: Online
    ISBN: 9783038054740
    Other identifier:
    9783038054733
    Series: Center for Information Technology Society and Law - ITSL ; Volume 9
    Subjects: Finanzmarkt; Finanzsektor; IT-Sicherheit; Compliance-Management; Risikomanagement; IT-Recht; Finanzmarktregulierung; Schweiz; Computer networks; Computer crimes; Computer security; Banks and banking
    Scope: 1 Online-Ressource (XXXVI, 151 Seiten)