Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Monografie  (33)
Publikationsform
  • Monografie  (33)
Verbünde
Sprache
  • 1
    UID:
    (DE-602)gbv_1882105842
    Umfang: 1 Online-Ressource
    ISBN: 9789004632950
    Serie: International Law - Book Archive pre-2000 3
    Inhalt: An essential reference for anyone involved in international affairs, the UNPO Yearbook is the only publication giving access to the material, situations and policies of the Unrepresented Nations and Peoples Organization and its diverse membership. Created by the members themselves in 1991, the UNPO provides a platform for those nations, peoples and minorities not represented in established international forums such as the United Nations. The mission of the organization is to assist its members in advancing their interests effectively through nonviolent means, including diplomacy, use of the UN and other international procedures for the protection of human rights, the exploration of legal options in defending their rights and the development of public awareness and opinion. With a revised member Report format and expanded index, as well as key Conference and Mission reports, the third edition of the UNPO Yearbook is an accessible and valuable tool for researchers, diplomats and policy-makers alike
    Anmerkung: Includes bibliographical references and index , Front Matter -- Introduction to the History and Principles of the UNPO / , English
    Weitere Ausg.: ISBN 9789041110220
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Unrepresented Nations and Peoples Organization Yearbook, Volume 3 (1997) Leiden : Brill | Nijhoff, 1998 ISBN 9789041110220
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Buch
    Buch
    Rockland, Mass. : Syngress Press | [Oxford] : Elsevier
    UID:
    (DE-627)512973180
    Umfang: XXXVI, 409 S
    ISBN: 1597490814 , 9781597490818
    Serie: Stealing the network
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    (DE-627)1604782552
    Umfang: XXXVI, 409 S. , Ill., graph. Darst.
    ISBN: 1597490814 , 9781597490818
    Serie: Black hat
    Weitere Ausg.: Online-Ausg. Long, Johnny, 1916 - 1972 Stealing the Network Rockland : William Andrew, 2011 9780080517759
    Sprache: Englisch
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Burlington : Elsevier Science
    UID:
    (DE-627)746551770
    Umfang: 448 p.
    ISBN: 9780080517759
    Inhalt: Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase
    Inhalt: The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master
    Anmerkung: Description based upon print version of record , Front Cover; Visit us at; How to Own a Shadow; Copyright Page; Acknowledgments; Authors; Story Editor; Technical Inspiration; Contributing Authors and Technical Editors, STN: How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul , Blue Paint, Dark SkiesRubber Bouncing Swords; A Hacker in the Making; Chapter 6. The Birth of Pawn; Showing Off For Rafa; The POST Challenge; ""C"" Is For Cookie; Chapter 7. Dishonorable Discharge; A 'Blah' Sort of Day; Just Another Random Encounter; Damsel In Distress; You're Not Just a Customer; First Contact; I've got an RFIDea...; Testing the Shark-Infested Waters; I've Got Good News and Bad News; Chapter 8. McGaylver; Appendix; Sins of the Father; The Interview; The Post Office; The Key; The Spreadsheet; Codewheels; The Restrooom; The Address; There's Something Else; The Chase , How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, th , How to Own an Identity; Contributing Authors; Special Contributor; Foreword Contributor; Copyeditor; Technical Editor and Contributor, STN: How to Own a Continent; Contributors; Technical Reviewer; Technicai Advisors; Technical Editor STN: How to Own the Box; Contributing Authors; Preface; Foreword; Chapter 1. Travel Plans; Chapter 2. Back in the Saddle; Chapter 3. Old Man and a Ghost; Chapter 4. Rootkit; Chapter 5. Paul
    Weitere Ausg.: Print version Stealing the Network : How to Own a Shadow
    Sprache: Englisch
    Schlagwort(e): Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    (DE-627)1882105842
    Umfang: 1 Online-Ressource
    ISBN: 9789004632950
    Serie: International Law - Book Archive pre-2000 3
    Inhalt: An essential reference for anyone involved in international affairs, the UNPO Yearbook is the only publication giving access to the material, situations and policies of the Unrepresented Nations and Peoples Organization and its diverse membership. Created by the members themselves in 1991, the UNPO provides a platform for those nations, peoples and minorities not represented in established international forums such as the United Nations. The mission of the organization is to assist its members in advancing their interests effectively through nonviolent means, including diplomacy, use of the UN and other international procedures for the protection of human rights, the exploration of legal options in defending their rights and the development of public awareness and opinion. With a revised member Report format and expanded index, as well as key Conference and Mission reports, the third edition of the UNPO Yearbook is an accessible and valuable tool for researchers, diplomats and policy-makers alike
    Anmerkung: Includes bibliographical references and index , Front Matter -- Introduction to the History and Principles of the UNPO / , English
    Weitere Ausg.: 9789041110220
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Unrepresented Nations and Peoples Organization Yearbook, Volume 3 (1997) Leiden : Brill | Nijhoff, 1998 9789041110220
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    (DE-627)165814029X
    Umfang: 1 online resource (448 pages)
    ISBN: 9780080517759
    Serie: Stealing the Network
    Inhalt: The final book in the best selling series.
    Inhalt: Front Cover -- Visit us at -- How to Own a Shadow -- Copyright Page -- Acknowledgments -- Authors -- Story Editor -- Technical Inspiration -- Contributing Authors and Technical Editors, STN: How to Own an Identity -- Contributing Authors -- Special Contributor -- Foreword Contributor -- Copyeditor -- Technical Editor and Contributor, STN: How to Own a Continent -- Contributors -- Technical Reviewer -- Technicai Advisors -- Technical Editor STN: How to Own the Box -- Contributing Authors -- Preface -- Foreword -- Chapter 1. Travel Plans -- Chapter 2. Back in the Saddle -- Chapter 3. Old Man and a Ghost -- Chapter 4. Rootkit -- Chapter 5. Paul -- Blue Paint, Dark Skies -- Rubber Bouncing Swords -- A Hacker in the Making -- Chapter 6. The Birth of Pawn -- Showing Off For Rafa -- The POST Challenge -- C" Is For Cookie -- Chapter 7. Dishonorable Discharge -- A 'Blah' Sort of Day -- Just Another Random Encounter -- Damsel In Distress -- You're Not Just a Customer -- First Contact -- I've got an RFIDea... -- Testing the Shark-Infested Waters -- I've Got Good News and Bad News -- Chapter 8. McGaylver -- Appendix -- Sins of the Father -- The Interview -- The Post Office -- The Key -- The Spreadsheet -- Codewheels -- The Restrooom -- The Address -- There's Something Else -- The Chase.
    Anmerkung: Description based on publisher supplied metadata and other sources
    Weitere Ausg.: 9781597490818
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Long, Johnny Stealing the network: how to own a shadow Rockland, Mass. : Syngress, 2007 1597490814
    Weitere Ausg.: 9781597490818
    Sprache: Englisch
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    [s.l.] : Elsevier monographs
    UID:
    (DE-627)679115099
    Umfang: Online Ressource (11382 KB, 1080 S.)
    Ausgabe: 1. Aufl.
    Ausgabe: Online-Ausg. 2009 Electronic reproduction; Mode of access: World Wide Web
    ISBN: 159749299X
    Serie: Safari Books Online
    Inhalt: Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one.- from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder Director, Black Hat, Inc. and Founder of DEFCONFor the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.This book contains all of the material from each of the four books in the Stealing the Network series.All of the stories and tech from:How to Own the BoxHow to Own a ContinentHow to Own an IdentityHow to Own a ShadowPlus:Finally - find out how the story ends! The final chapter is here!A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of Knuth in the much anticipated Final Chapter
    Anmerkung: Description based upon print version of record , Front Cover; Stealing the Network: The Complete Series Collector's Edition; Copyright Page; Contents; Author Biographies; AUTHORS AND TECHNICAL EDITORS; CONTRIBUTING AUTHORS; PART I: How to Own the Box; Foreword; CHAPTER 1 Hide and Sneak; TOOLS; THE SCAN; STUPID CISCO TRICKS; THE COMPUTER IS THE COMPUTER, MR. MCNEALY; THE WEB, THE WEB … IT'S ALWAYS THE WEB; KISS, OR KEEP IT SIMPLE, STUPID; THE JACKPOT; WITH CUSTOMERS LIKE ME…; CHAPTER 2 The Worm Turns; MR. WORM; YOU CAN GET IT IF YOU REALLY WANT; NO LIFE 'TIL LEATHER; IT'S POURING, IT'S RAINING; I LIVE MY LIFE LIKE THERE'S NO TOMORROW , IT'S LIKE BROKEN GLASS YOU GET CUT BEFORE YOU SEE IT; IF YOU LIKE TO GAMBLE; MUMBLE, MUMBLE, MUMBLE; CHAPTER 3 Just Another Day at the Office; SETUP; WELCOMING COMMITTEE; LOW-HANGING FRUIT; IN THE PALM OF MY HAND; FEELING GOOD IN THE NETWORK NEIGHBORHOOD; WHAT'S THAT SMELL?; WORKING FROM HOME; DINER; THE ONLY WAY OUT; EPILOGUE; REFERENCES; CHAPTER 4 h3X's Adventures in Networkland; HALFWAY AROUND THE GLOBE AT BSZH.EDU; EXPLORING THE PREY; D-DAY; TRAINEES FIRST; SECRET SERVICE(S); DISCOVERY; THE GIRL IS BACK IN THE HOUSE; AFTERMATH; CHAPTER 5 The Thief No One Saw; THE TIP-OFF , STUDYING THE PREYTHE DNS GIVEAWAY; TIME TO GET MY HANDS DIRTY; GETTING INSIDE THE VPN; FINDING THE SOFTWARE; LOOKING AROUND; CONCLUSION; CHAPTER 6 Flying the Friendly Skies; REFERENCES; CHAPTER 7 dis-card; 0-DAYS; REVERSE-ENGINEERING PEOPLE; INFORMATION; CHAPTER 8 Social (In)Security; RECON; WHAT DOES GOOGLE PULL UP?; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING , SUCCESS, OR YOU CAN TEACH AN OLD BADGE NEW TRICKSBUSINESS AS USUAL?; CHAPTER 9 BabelNet; HELLO NAVI; MIRROR, MIRROR ON THE WALL; POLYGLOT; WHEN GOOD PACKETS GO BAD; AUTHORSPEAK: PAKETTO BORNE; AND THEY SAY WE'RE SOCIAL CREATURES; KNOCK, KNOCK; WHO'S THERE?; SCANRAND; SCANRAND WHO?; SCANRAND U; BACK TO OUR REGULARLY SCHEDULED HACKERY; CHAPTER 10 The Art of Tracking; TUESDAY; WEDNESDAY; THURSDAY; FRIDAY; MONDAY; Appendix: The Laws of Security; INTRODUCTION; KNOWING THE LAWS OF SECURITY; CLIENT-SIDE SECURITY DOESN'T WORK , YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM , IN ORDER FOR A SYSTEM TO BEGIN TO BE CONSIDERED SECURE, IT MUST UNDERGO AN INDEPENDENT SECURITY AUDIT , Electronic reproduction; Mode of access: World Wide Web
    Weitere Ausg.: 0080949207
    Weitere Ausg.: 9780080949208
    Weitere Ausg.: Print version Stealing the Network : The Complete Series Collector's Edition, Final Chapter, and DVD
    Sprache: Englisch
    Schlagwort(e): Electronic books
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Burlington, Mass. : Syngress
    UID:
    (DE-603)291514200
    Umfang: xxxi, 1038 p. S. , 25 cm. + 1DVD (4 3/4 in)
    Ausgabe: Online-Ausg. Sebastopol, CA O'Reilly Media Inc. Online-Ressource Safari Tech Books Online [Online-Ausg.]
    ISBN: 9781597492997 , 159749299X
    Serie: Safari Books Online
    Anmerkung: Online-Ausg.:
    Sprache: Englisch
    Schlagwort(e): Online-Publikation
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    AV-Medium
    AV-Medium
    München : Leonine Distribution GmbH
    UID:
    (DE-605)(DE-131)9822606
    Umfang: 1 DVD-Video (97 min) , farbig
    Anmerkung: Original: Kanada, 2023.- Sprachen: Deutsch, Englisch ; Untertitel: Deustch für Hörgeschädigte.- Bonusmaterial: behind the scenes, Trailer
    Sprache: Deutsch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    UID:
    (DE-627)1680478575
    Umfang: 1 online resource (1 v.) , ill.
    ISBN: 9780080517759 , 0080517757
    Serie: Stealing the network
    Inhalt: The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief , Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
    Anmerkung: "Black Hat"--Cover. - Description based on print version record
    Weitere Ausg.: 1597490814
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe 1597490814
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz