Narrow Search
Search narrowed by
Last searches

Results for *

Displaying results 1 to 12 of 12.

  1. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Fiction; Suspense fiction; Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Other subjects: Short stories
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  2. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Fiction; Computer hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource (1 online resource)
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  3. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: ©2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction Ser
    Subjects: Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 Online-Ressource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

  4. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 1931836051; 9781932266788; 9781931836050
    Subjects: Computer hackers; Computer security; Cyberterrorism; Hackers
    Scope: Online-Ressource
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

    Title from e-book title screen (viewed June 10, 2004)

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  5. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Ostbayerische Technische Hochschule Amberg-Weiden / Hochschulbibliothek Amberg
    Unlimited inter-library loan, copies and loan
    Ostbayerische Technische Hochschule Amberg-Weiden, Hochschulbibliothek, Standort Weiden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836051; 193226678X; 9781931836050; 9781932266788
    Subjects: Computer hackers; Computer security; Cyberterrorism; Computer security; Hackers; Cyberterrorism
    Scope: 1 Online-Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

    Control yourself - Ryan Russell -- - The lagos creeper - 131ah -- - Product of fate: the evolution of a hacker - Russ Rogers -- - A real gullible genius - Jay Beale -- - For whom Ma Bell tolls - Joe Grand -- - Return on investment - Fyodor -- - h3X and the big picture - FX -- - The story of Dex - Paul Craig -- - Automatic terror machine - Tim Mullen -- - Get out quick - Ryan Russell

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world

    Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

  6. Stealing the network
    how to own a continent
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this... more

     

    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788; 9781931836050; 1931836051
    Subjects: FICTION / General; Computer security; Cyberterrorism; Hackers; Computer security; Hackers; Cyberterrorism
    Scope: 1 online resource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc."

    Includes bibliographical references

  7. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: © 2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098; 9780080543925; 0080543928
    Series: Cyber-Fiction Ser
    Subjects: FICTION / General; Hackers; Computer networks / Security measures; Computer security; Computer security; Hackers; Computer networks
    Scope: 1 online resource
    Notes:

    "Rob Shein aka Rogue Shoten.". - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' page

  8. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Hackers; Computer networks; Computer security; Hackers; Computer networks; Hackers; Computer networks ; Security measures; Computer security; FICTION ; General; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

  9. Zero day exploit
    countdown to darkness
    Author: Shein, Rob
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Zentrale Hochschulbibliothek Lübeck
    KaufEBook202103
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan
    Bibliotheks-und Informationssystem der Carl von Ossietzky Universität Oldenburg (BIS)
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (An electronic book accessible through the World Wide Web; click for information)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1931836094; 1932266763; 9781931836098; 9781932266764
    Series: Cyber-Fiction
    Subjects: Computer hackers; Computer networks; Computer networks; Computer security; Hackers
    Scope: Online-Ressource (xxii, 339 p), 24 cm
    Notes:

    "Foreword by David Litchfield

    "Rob Shein aka Rogue Shoten

    Electronic reproduction; Mode of access: World Wide Web

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

  10. Stealing the network
    how to own a continent
    Published: c2004
    Publisher:  Syngress, Rockland, MA

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX... more

    Access:
    Aggregator (lizenzpflichtig)
    Hochschule Aalen, Bibliothek
    E-Book EBSCO
    No inter-library loan
    Hochschule Esslingen, Bibliothek
    E-Book Ebsco
    No inter-library loan
    Saarländische Universitäts- und Landesbibliothek
    No inter-library loan
    Universitätsbibliothek der Eberhard Karls Universität
    No inter-library loan

     

    Control yourself /Ryan Russell --The lagos creeper /131ah --Product of fate: the evolution of a hacker /Russ Rogers --A real gullible genius /Jay Beale --For whom Ma Bell tolls /Joe Grand --Return on investment /Fyodor --h3X and the big picture /FX --The story of Dex /Paul Craig --Automatic terror machine /Tim Mullen --Get out quick /Ryan Russell. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 193226678X; 9781932266788
    Subjects: Computer security; Hackers; Cyberterrorism; Computer security; Hackers; Cyberterrorism; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories; FICTION ; General
    Scope: Online Ressource
    Notes:

    Title from e-book title screen (viewed June 10, 2004). - "Foreword by Jeff Moss, President & CEO, Black Hat, Inc

  11. Stealing the network
    how to own a continent
    Published: 2004
    Publisher:  Syngress, Rockland, Mass

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX --... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    Control yourself Ryan Russell -- The lagos creeper 131ah -- Product of fate: the evolution of a hacker Russ Rogers -- A real gullible genius Jay Beale -- For whom Ma Bell tolls Joe Grand -- Return on investment Fyodor -- h3X and the big picture FX -- The story of Dex Paul Craig -- Automatic terror machine Tim Mullen -- Get out quick Ryan Russell This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Written by today's leading security and counter-terriorism experts, this sequel to "Stealing the Network: How to Own the Box" operates on a truly global stage when the network infrastructure of an entire continent is compromised

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781931836050; 1931836051; 9781932266788; 193226678X
    Subjects: Computer hackers; Computer security; Cyberterrorism; Cyberterrorism; Computer security; Hackers; Computer hackers; FICTION ; General; Computer security; Cyberterrorism; Hackers; Fiction; Suspense fiction; Short stories
    Scope: Online Ressource (402 p.), ill., ports.
    Notes:

    "Foreword by Jeff Moss, President & CEO, Black hat, Inc"--Cover. - Description based on print version record

    Ryan Russell: Control yourself

    131ah: The lagos creeper

    Russ Rogers: Product of fate: the evolution of a hacker

    Jay Beale: A real gullible genius

    Joe Grand: For whom Ma Bell tolls

    Fyodor: Return on investment

    FX: h3X and the big picture

    Paul Craig: The story of Dex

    Tim Mullen: Automatic terror machine

    Ryan Russell.: Get out quick

  12. Zero day exploit
    countdown to darkness
    Published: c2004
    Publisher:  Syngress Pub, Rockland, MA

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to... more

    Hochschule Aalen, Bibliothek
    E-Book Elsevier
    No inter-library loan
    Zentrale Hochschulbibliothek Lübeck
    No inter-library loan

     

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (lizenzpflichtig)
    Source: Union catalogues
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 1932266763; 9781932266764; 1931836094; 9781931836098
    Series: Cyber-Fiction Ser
    Subjects: Computer security; Computer hackers; Computer networks; Computer networks; Computer security; Hackers; Security measures; Computer hackers; FICTION ; General; Hackers; Computer networks ; Security measures; Computer security; Fiction
    Scope: Online Ressource
    Notes:

    "Rob Shein aka Rogue Shoten. - Title from e-book title screen (viewed Sept. 1, 2004). - "Foreword by David Litchfield."--E-book 'cover' p

    Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security