My Account | Home| Bulletin Board| Cart | Help
Close Session
IISER-KIndian Institute of Science Education & Research - Kolkata
Quick Search
Search Terms:
All Documents
Books
Newspapers
Periodicals
Articles
Theses
E-Books
Database : IISERK

Set Session Filters
Login to ask the library to add a book.
Active Filter Settings
No Active Filters
There are 0 titles in your cart.

Search History
Special Collections: Government Publications
Special Collections: Audio Cassettes
ty:m & bl:m
Serial Collections: Newspapers
Special Collections: Maps
Special Collections: Music Scores
Recommended Reading
first record | previous record | next record | last record
full | marc
Record 1 of 1
  Total Requests  0      Unsatisfied Requests  0
You searched IISERK - Subject: Computer networks.
Request
Call Number 005.8
Title Stealing the network [electronic resource] : how to own an identity / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor.
Title You are who the computer says you are
Publication Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly Media, c2005.
Material Info. xxiv, 333 p. : ill. ; 24 cm.
Summary Note The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book.
Notes In the Beginning; Sins of the Father; Saul on the Run; The Seventh Wave; Bl@cktoWer; The java Script Cafe; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; Ther's Something Else; The Chase; part II: Behind the Scenes; The Conversation; Social Insecurity;.
Notes pt. 1 Evasion: Prologue from the diary of Robert Knoll, Senior / Ryan Russell ; In the beginning ... / Caezar as The Woman With No Name ; Sins of the father / Ryan Russell as Robert ; Saul on the run / Chris Hurley as Saul ; The seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as Glenn ; The Java SCript CafeĢ / Raven Alder as Natasha ; Death by a thousand cuts / Johnny Long with Anthony Kokocinski ; A really gullible genius makes amends / Jay Beale as Flir ; Near miss / Tom Parker as Carlton ; There's something else / Johnny Long with Anthony Kokocinski ; Epilogue : The chase / Johnny Long -- pt. 2. Behind the scenes: The conversation / Jeff Moss as Tom ; Social insecurity / Thor.
Notes Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2007.
ISBN 9781597490061
ISBN 1597490067
Subject Identity theft Fiction.
Subject Computer crimes Fiction.
Subject Computer hackers Fiction.
Subject Computer security Fiction.
Subject Computer hackers Psychology Fiction.
Subject Short stories.
Subject Electronic books.
Added Entry Alder, Raven.
Added Entry Mullen, Timothy M.
Added Entry Long, Johnny.
Added Entry ScienceDirect (Online service)
Date Year, Month, Day:01405141
Link An electronic book accessible through the World Wide Web; click for information ScienceDirect

Keyword Search

 Words: Search Type:
 
 

Database: IISERK

Any filter options that are chosen below will be combined with the Session Filters and applied to the search.
Nature of Contents Filters Format Filters

Including Excluding

Including Excluding
Language Filters Place of Publication Filters

Including Excluding

Including Excluding
Publication Date Context Date
  -     -  

Set Session Filters
Select below to return to the last:
Copyright © 2014 VTLS Inc. All rights reserved.
VTLS.com