Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Type of Publication
Consortium
Language
  • 1
    UID:
    (DE-627)1604782552
    Format: XXXVI, 409 S. , Ill., graph. Darst.
    ISBN: 1597490814 , 9781597490818
    Series Statement: Black hat
    Additional Edition: Online-Ausg. Long, Johnny, 1916 - 1972 Stealing the Network Rockland : William Andrew, 2011 9780080517759
    Language: English
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    (DE-627)1882105842
    Format: 1 Online-Ressource
    ISBN: 9789004632950
    Series Statement: International Law - Book Archive pre-2000 3
    Content: An essential reference for anyone involved in international affairs, the UNPO Yearbook is the only publication giving access to the material, situations and policies of the Unrepresented Nations and Peoples Organization and its diverse membership. Created by the members themselves in 1991, the UNPO provides a platform for those nations, peoples and minorities not represented in established international forums such as the United Nations. The mission of the organization is to assist its members in advancing their interests effectively through nonviolent means, including diplomacy, use of the UN and other international procedures for the protection of human rights, the exploration of legal options in defending their rights and the development of public awareness and opinion. With a revised member Report format and expanded index, as well as key Conference and Mission reports, the third edition of the UNPO Yearbook is an accessible and valuable tool for researchers, diplomats and policy-makers alike
    Note: Includes bibliographical references and index , Front Matter -- Introduction to the History and Principles of the UNPO / , English
    Additional Edition: 9789041110220
    Additional Edition: Erscheint auch als Druck-Ausgabe Unrepresented Nations and Peoples Organization Yearbook, Volume 3 (1997) Leiden : Brill | Nijhoff, 1998 9789041110220
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    (DE-602)gbv_1882105842
    Format: 1 Online-Ressource
    ISBN: 9789004632950
    Series Statement: International Law - Book Archive pre-2000 3
    Content: An essential reference for anyone involved in international affairs, the UNPO Yearbook is the only publication giving access to the material, situations and policies of the Unrepresented Nations and Peoples Organization and its diverse membership. Created by the members themselves in 1991, the UNPO provides a platform for those nations, peoples and minorities not represented in established international forums such as the United Nations. The mission of the organization is to assist its members in advancing their interests effectively through nonviolent means, including diplomacy, use of the UN and other international procedures for the protection of human rights, the exploration of legal options in defending their rights and the development of public awareness and opinion. With a revised member Report format and expanded index, as well as key Conference and Mission reports, the third edition of the UNPO Yearbook is an accessible and valuable tool for researchers, diplomats and policy-makers alike
    Note: Includes bibliographical references and index , Front Matter -- Introduction to the History and Principles of the UNPO / , English
    Additional Edition: ISBN 9789041110220
    Additional Edition: Erscheint auch als Druck-Ausgabe Unrepresented Nations and Peoples Organization Yearbook, Volume 3 (1997) Leiden : Brill | Nijhoff, 1998 ISBN 9789041110220
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Burlington : Elsevier Science
    UID:
    (DE-627)746551770
    Format: 448 p.
    ISBN: 9780080517759
    Content: Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase
    Content: The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master
    Note: Description based upon print version of record , Front Cover; Visit us at; How to Own a Shadow; Copyright Page; Acknowledgments; Authors; Story Editor; Technical Inspiration; Contributing Authors and Technical Editors, STN: How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul , Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase , How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, th , How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul
    Additional Edition: Print version Stealing the Network : How to Own a Shadow
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Rockland, Mass. : Syngress Press | [Oxford] : Elsevier
    UID:
    (DE-627)512973180
    Format: XXXVI, 409 S
    ISBN: 1597490814 , 9781597490818
    Series Statement: Stealing the network
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    (DE-627)679115099
    Format: Online Ressource (11382 KB, 1080 S.)
    Edition: 1. Aufl.
    Edition: Online-Ausg. 2009 Electronic reproduction; Mode of access: World Wide Web
    ISBN: 159749299X
    Series Statement: Safari Books Online
    Content: Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one.- from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder Director, Black Hat, Inc. and Founder of DEFCONFor the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.This book contains all of the material from each of the four books in the Stealing the Network series.All of the stories and tech from:How to Own the BoxHow to Own a ContinentHow to Own an IdentityHow to Own a ShadowPlus:Finally - find out how the story ends! The final chapter is here!A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of Knuth in the much anticipated Final Chapter
    Note: Description based upon print version of record , Front Cover; Stealing the Network: The Complete Series Collector's Edition; Copyright Page; Contents; Author Biographies; AUTHORS AND TECHNICAL EDITORS; CONTRIBUTING AUTHORS; PART I: How to Own the Box; Foreword; CHAPTER 1 Hide and Sneak; TOOLS; THE SCAN; STUPID CISCO TRICKS; THE COMPUTER IS THE COMPUTER, MR. MCNEALY; THE WEB, THE WEB … IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME…; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW , IT'S LIKE BROKEN GLASS YOU GET CUT BEFORE YOU SEE IT; IF YOU LIKE TO GAMBLE; MUMBLE, MUMBLE, MUMBLE; CHAPTER 3 Just Another Day at the Office; SETUP; WELCOMING COMMITTEE; LOW-HANGING FRUIT; IN THE PALM OF MY HAND; FEELING GOOD IN THE NETWORK NEIGHBORHOOD; WHAT'S THAT SMELL?; WORKING FROM HOME; DINER; THE ONLY WAY OUT; EPILOGUE; REFERENCES; CHAPTER 4 h3X's Adventures in Networkland; HALFWAY AROUND THE GLOBE AT BSZH.EDU; EXPLORING THE PREY; D-DAY; TRAINEES FIRST; SECRET SERVICE(S); DISCOVERY; THE GIRL IS BACK IN THE HOUSE; AFTERMATH; CHAPTER 5 The Thief No One Saw; THE TIP-OFF , STUDYING THE PREYTHE DNS GIVEAWAY; TIME TO GET MY HANDS DIRTY; GETTING INSIDE THE VPN; FINDING THE SOFTWARE; LOOKING AROUND; CONCLUSION; CHAPTER 6 Flying the Friendly Skies; REFERENCES; CHAPTER 7 dis-card; 0-DAYS; REVERSE-ENGINEERING PEOPLE; INFORMATION; CHAPTER 8 Social (In)Security; RECON; WHAT DOES GOOGLE PULL UP?; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING , SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKSBUSINESS AS USUAL?; CHAPTER 9 BabelNet; HELLO NAVI; MIRROR, MIRROR ON THE WALL; POLYGLOT; WHEN GOOD PACKETS GO BAD; AUTHORSPEAK: PAKETTO BORNE; AND THEY SAY WE'RE SOCIAL CREATURES; KNOCK, KNOCK; WHO'S THERE?; SCANRAND; SCANRAND WHO?; SCANRAND U; BACK TO OUR REGULARLY SCHEDULED HACKERY; CHAPTER 10 The Art of Tracking; TUESDAY; WEDNESDAY; THURSDAY; FRIDAY; MONDAY; Appendix: The Laws of Security; INTRODUCTION; KNOWING THE LAWS OF SECURITY; CLIENT-SIDE SECURITY DOESN'T WORK , YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM , IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT , Electronic reproduction; Mode of access: World Wide Web
    Additional Edition: 0080949207
    Additional Edition: 9780080949208
    Additional Edition: Print version Stealing the Network : The Complete Series Collector's Edition, Final Chapter, and DVD
    Language: English
    Keywords: Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    (DE-627)165814029X
    Format: 1 online resource (448 pages)
    ISBN: 9780080517759
    Series Statement: Stealing the Network
    Content: The final book in the best selling series.
    Content: Front Cover -- Visit us at -- How to Own a Shadow -- Copyright Page -- Acknowledgments -- Authors -- Story Editor -- Technical Inspiration -- Contributing Authors and Technical Editors, STN: How to Own an Identity -- Contributing Authors -- Special Contributor -- Foreword Contributor -- Copyeditor -- Technical Editor and Contributor, STN: How to Own a Continent -- Contributors -- Technical Reviewer -- Technicai Advisors -- Technical Editor STN: How to Own the Box -- Contributing Authors -- Preface -- Foreword -- Chapter 1. Travel Plans -- Chapter 2. Back in the Saddle -- Chapter 3. Old Man and a Ghost -- Chapter 4. Rootkit -- Chapter 5. Paul -- Blue Paint, Dark Skies -- Rubber Bouncing Swords -- A Hacker in the Making -- Chapter 6. The Birth of Pawn -- Showing Off For Rafa -- The POST Challenge -- C" Is For Cookie -- Chapter 7. Dishonorable Discharge -- A 'Blah' Sort of Day -- Just Another Random Encounter -- Damsel In Distress -- You're Not Just a Customer -- First Contact -- I've got an RFIDea... -- Testing the Shark-Infested Waters -- I've Got Good News and Bad News -- Chapter 8. McGaylver -- Appendix -- Sins of the Father -- The Interview -- The Post Office -- The Key -- The Spreadsheet -- Codewheels -- The Restrooom -- The Address -- There's Something Else -- The Chase.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9781597490818
    Additional Edition: Erscheint auch als Druck-Ausgabe Long, Johnny Stealing the network: how to own a shadow Rockland, Mass. : Syngress, 2007 1597490814
    Additional Edition: 9781597490818
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    (DE-603)291514200
    Format: xxxi, 1038 p. S. , 25 cm. + 1DVD (4 3/4 in)
    Edition: Online-Ausg. Sebastopol, CA O'Reilly Media Inc. Online-Ressource Safari Tech Books Online [Online-Ausg.]
    ISBN: 9781597492997 , 159749299X
    Series Statement: Safari Books Online
    Note: Online-Ausg.:
    Language: English
    Keywords: Online-Publikation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    UID:
    (DE-627)1680445138
    Format: xxxi, 1038 p , ill. , 25 cm. + 1DVD (4 3/4 in)
    ISBN: 9781597492997 , 159749299X
    Content: "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass. This book contains all of the material from each of the four books in the Stealing the Network series. All of the stories and tech from: How to Own the Box How to Own a Continent How to Own an Identity How to Own a Shadow Plus: Finally - find out how the story ends! The final chapter is here! A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of "Knuth" in the much anticipated Final Chapter
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    (DE-627)574819487
    Format: XXXI, 1038 S. , Ill. , 1 DVD
    ISBN: 159749299X , 9781597492997
    Language: English
    Keywords: Computersicherheit ; Computerkriminalität
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages