Format:
Online Ressource (11382 KB, 1080 S.)
Edition:
1. Aufl.
Edition:
Online-Ausg. 2009 Electronic reproduction; Mode of access: World Wide Web
ISBN:
159749299X
Series Statement:
Safari Books Online
Content:
Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one.- from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder Director, Black Hat, Inc. and Founder of DEFCONFor the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.This book contains all of the material from each of the four books in the Stealing the Network series.All of the stories and tech from:How to Own the BoxHow to Own a ContinentHow to Own an IdentityHow to Own a ShadowPlus:Finally - find out how the story ends! The final chapter is here!A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of Knuth in the much anticipated Final Chapter
Note:
Description based upon print version of record
,
Front Cover; Stealing the Network: The Complete Series Collector's Edition; Copyright Page; Contents; Author Biographies; AUTHORS AND TECHNICAL EDITORS; CONTRIBUTING AUTHORS; PART I: How to Own the Box; Foreword; CHAPTER 1 Hide and Sneak; TOOLS; THE SCAN; STUPID CISCO TRICKS; THE COMPUTER IS THE COMPUTER, MR. MCNEALY; THE WEB, THE WEB … IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME…; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW
,
IT'S LIKE BROKEN GLASS YOU GET CUT BEFORE YOU SEE IT; IF YOU LIKE TO GAMBLE; MUMBLE, MUMBLE, MUMBLE; CHAPTER 3 Just Another Day at the Office; SETUP; WELCOMING COMMITTEE; LOW-HANGING FRUIT; IN THE PALM OF MY HAND; FEELING GOOD IN THE NETWORK NEIGHBORHOOD; WHAT'S THAT SMELL?; WORKING FROM HOME; DINER; THE ONLY WAY OUT; EPILOGUE; REFERENCES; CHAPTER 4 h3X's Adventures in Networkland; HALFWAY AROUND THE GLOBE AT BSZH.EDU; EXPLORING THE PREY; D-DAY; TRAINEES FIRST; SECRET SERVICE(S); DISCOVERY; THE GIRL IS BACK IN THE HOUSE; AFTERMATH; CHAPTER 5 The Thief No One Saw; THE TIP-OFF
,
STUDYING THE PREYTHE DNS GIVEAWAY; TIME TO GET MY HANDS DIRTY; GETTING INSIDE THE VPN; FINDING THE SOFTWARE; LOOKING AROUND; CONCLUSION; CHAPTER 6 Flying the Friendly Skies; REFERENCES; CHAPTER 7 dis-card; 0-DAYS; REVERSE-ENGINEERING PEOPLE; INFORMATION; CHAPTER 8 Social (In)Security; RECON; WHAT DOES GOOGLE PULL UP?; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING
,
SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKSBUSINESS AS USUAL?; CHAPTER 9 BabelNet; HELLO NAVI; MIRROR, MIRROR ON THE WALL; POLYGLOT; WHEN GOOD PACKETS GO BAD; AUTHORSPEAK: PAKETTO BORNE; AND THEY SAY WE'RE SOCIAL CREATURES; KNOCK, KNOCK; WHO'S THERE?; SCANRAND; SCANRAND WHO?; SCANRAND U; BACK TO OUR REGULARLY SCHEDULED HACKERY; CHAPTER 10 The Art of Tracking; TUESDAY; WEDNESDAY; THURSDAY; FRIDAY; MONDAY; Appendix: The Laws of Security; INTRODUCTION; KNOWING THE LAWS OF SECURITY; CLIENT-SIDE SECURITY DOESN'T WORK
,
YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM
,
IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT
,
Electronic reproduction; Mode of access: World Wide Web
Additional Edition:
0080949207
Additional Edition:
9780080949208
Additional Edition:
Print version Stealing the Network : The Complete Series Collector's Edition, Final Chapter, and DVD
Language:
English
Keywords:
Electronic books
Bookmarklink