Long / Mullen / Russell | Stealing the Network | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 448 Seiten

Long / Mullen / Russell Stealing the Network

How to Own a Shadow
1. Auflage 2011
ISBN: 978-0-08-051775-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

How to Own a Shadow

E-Book, Englisch, 448 Seiten

ISBN: 978-0-08-051775-9
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book's companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

? The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

? The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

? Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Long / Mullen / Russell Stealing the Network jetzt bestellen!

Weitere Infos & Material


1;Front Cover;1
2;Visit us at;2
3;How to Own a Shadow;4
4;Copyright Page;5
5;Acknowledgments;6
6;Authors;8
7;Story Editor;12
8;Technical Inspiration;12
9;Contributing Authors and Technical Editors, STN: How to Own an Identity;14
10;Contributing Authors;16
11;Special Contributor;20
12;Foreword Contributor;21
13;Copyeditor;21
14;Technical Editor and Contributor, STN: How to Own a Continent;22
15;Contributors;22
16;Technical Reviewer;28
17;Technicai Advisors;29
18;Technical Editor STN: How to Own the Box;30
19;Contributing Authors;31
20;Preface;34
21;Foreword;36
22;Chapter 1. Travel Plans;38
23;Chapter 2. Back in the Saddle;70
24;Chapter 3. Old Man and a Ghost;109
25;Chapter 4. Rootkit;116
26;Chapter 5. Paul;141
26.1;Blue Paint, Dark Skies;143
26.2;Rubber Bouncing Swords;158
26.3;A Hacker in the Making;186
27;Chapter 6. The Birth of Pawn;196
27.1;Showing Off For Rafa;229
27.2;The POST Challenge;234
27.3;"C" Is For Cookie;247
28;Chapter 7. Dishonorable Discharge;283
28.1;A 'Blah' Sort of Day;287
28.2;Just Another Random Encounter;307
28.3;Damsel In Distress;309
28.4;You're Not Just a Customer;311
28.5;First Contact;315
28.6;I've got an RFIDea...;319
28.7;Testing the Shark-Infested Waters;344
28.8;I've Got Good News and Bad News;366
29;Chapter 8. McGaylver;371
30;Appendix;392
30.1;Sins of the Father;392
30.2;The Interview;394
30.3;The Post Office;397
30.4;The Key;398
30.5;The Spreadsheet;401
30.6;Codewheels;402
30.7;The Restrooom;414
30.8;The Address;416
31;There's Something Else;422
32;The Chase;440



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.