|
|
libcats.org
Stealing the Network: How to Own an IdentityRyan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Timothy MullenThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected - to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book"
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Nucleation (Butterworth 2000)Автор: Dimo KashchievКатегория: Phase transitions
Размер книги: 4.70 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Genki 1: An Integrated Course in Elementary Japanese 1Автор: Eri Banno, Автор: Yutaka Ohno, Автор: Yoko Sakane, Автор: Chikako Shinagawa, Автор:
Размер книги: 172.22 Mb
Только что пользователи скачали эти книги:
Подари себе рай (Действо 2)Автор: Бенюх ОлесьКатегория: Русская классическая проза
Размер книги: 374 Kb
Вечера по физике в средней школе. Пособие для учителейАвтор: Браверман Э.М.Категория: Physics, School-level
Размер книги: 6.51 Mb
Русский язык. В 2 ч. - Синтаксис. Учеб. для студ. сред. пед. учеб. заведенийАвтор: Земский А.М., Автор: и др.Категория: Языкознание в целом литературоведение
Размер книги: 1.08 Mb
An Introduction to HTML and JavaScript for Scientists and EngineersАвтор: David R. Brooks
Размер книги: 3.46 Mb
Linear Time Varying Systems and Sampled-data Systems (Lecture Notes in Control and Information Sciences)Автор: Akira Ichikawa, Автор: Hitoshi Katayama
Размер книги: 3.85 Mb
Friction in Textile Materials (Woodhead Publishing in Textiles)Автор: B. Gupta
Размер книги: 9.14 Mb
|
|
|