Stealing the Network: How to Own an Identity
Elsevier, 24 серп. 2005 р. - 450 стор.
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Відгуки відвідувачів - Написати рецензію
Не знайдено жодних рецензій.
Theres Something Else
Інші видання - Показати все
Agent asked attack Bender Blain Bluetooth Brian bytes Carlton cell phone certificate Charles Charlos client command connection couldn’t Daniela database desktop device didn’t door e-mail encrypted Flir Flir’s forensics going hack hacker hand head Heinz Hewson Hobbit Hushmail identity ifconfig inside Internet iPod Jeff Moss Jordan keyboard keystroke keystroke log knew Knoppix Knuth laptop Linux looked LPAR machine man-in-the-middle Matthew Mitch MX records Natasha never nmap openssl Pacific Tech packets passphrase password port problem pulled Robert rootkit Ryan Saul sent server social security numbers someone Striph stuff sure Syngress tcpdump thing thought took trying waiting walked wasn’t watching web server What’s Windows wireless
Сторінка i - From the Author" Forum that allows the authors of this book to post timely updates, links to related sites, or additional topic coverage that may have been requested by readers. Just visit us at www.syngress.com/solutions and follow the simple registration process. You will need to have this book with you when you register. Thank you for giving us the opportunity to serve your needs. And be sure to let us know if there is anything else we can do to make your job easier.
Сторінка i - Through this site, we've been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only email@example.com program. Once you have registered, you will enjoy several benefits, including: • Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format.
Сторінка v - Stealing the Network: How to Own an Identity Timothy Mullen, Ryan Russell, Riley (Caezar) Eller, Jeff Moss, Jay Beale, Johnny Long, Chris Hurley, Tom Parker, Brian Hatch The first two books in this series "Stealing the Network: How to Own the Box' and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
Сторінка x - Chris Hurley (aka Roamer) is a Senior Penetration Tester working in the Washington, DC area. He is the founder of the Worldwide WarDrive, an effort by INFOSEC professionals and hobbyists to generate awareness of the insecurities associated with wireless networks and is the lead organizer of the DEF CON WarDriving Contest. Although he primarily focuses on penetration testing these days, Chris also has extensive experience performing vulnerability assessments, forensics, and incident response. Chris...