Stealing the network: the complete series collector's edition
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers...
Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Burlington, Mass.
Syngress
2009
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597492997/?ar |
Summary: | "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--The Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black H |
Item Description: | Print version record |
Physical Description: | 1 Online-Ressource (xxxi, 1038 Seiten) illustrations |
ISBN: | 9781597492997 159749299X 9780080949208 0080949207 1282737791 9781282737792 9786612737794 6612737794 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04764771X | ||
003 | DE-627-1 | ||
005 | 20240228114428.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2009 xx |||||o 00| ||eng c | ||
020 | |a 9781597492997 |9 978-1-59749-299-7 | ||
020 | |a 159749299X |9 1-59749-299-X | ||
020 | |a 9780080949208 |c electronic bk. |9 978-0-08-094920-8 | ||
020 | |a 0080949207 |c electronic bk. |9 0-08-094920-7 | ||
020 | |a 1282737791 |9 1-282-73779-1 | ||
020 | |a 9781282737792 |9 978-1-282-73779-2 | ||
020 | |a 9786612737794 |9 9786612737794 | ||
020 | |a 6612737794 |9 6612737794 | ||
035 | |a (DE-627-1)04764771X | ||
035 | |a (DE-599)KEP04764771X | ||
035 | |a (ORHE)9781597492997 | ||
035 | |a (DE-627-1)04764771X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 813/.6 |2 22 | |
100 | 1 | |a Russell, Ryan |d 1969- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Stealing the network |b the complete series collector's edition |c Ryan Russell, Timothy Mullen, Johnny Long |
264 | 1 | |a Burlington, Mass. |b Syngress |c 2009 | |
300 | |a 1 Online-Ressource (xxxi, 1038 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--The Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black H | ||
546 | |a English. | ||
650 | 0 | |a Hackers |v Fiction | |
650 | 0 | |a Computer security |v Fiction | |
650 | 0 | |a Cyberterrorism |v Fiction | |
650 | 0 | |a Short stories, American |y 21st century | |
650 | 4 | |a 2000-2099 | |
650 | 4 | |a Pirates informatiques ; Romans, nouvelles, etc | |
650 | 4 | |a Sécurité informatique ; Romans, nouvelles, etc | |
650 | 4 | |a Cyberterrorisme ; Romans, nouvelles, etc | |
650 | 4 | |a Nouvelles américaines ; 21e siècle | |
650 | 4 | |a Computer hackers ; Fiction | |
650 | 4 | |a Computer security ; Fiction | |
650 | 4 | |a Cyberterrorism ; Fiction | |
650 | 4 | |a Short stories, American ; 21st century | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Short stories, American | |
650 | 4 | |a Fiction | |
700 | 1 | |a Mullen, Timothy M. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Long, Johnny |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597492997 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492997 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597492997/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-04764771X |
---|---|
_version_ | 1829007776751288320 |
adam_text | |
any_adam_object | |
author | Russell, Ryan 1969- |
author2 | Mullen, Timothy M. Long, Johnny |
author2_role | ctb ctb |
author2_variant | t m m tm tmm j l jl |
author_facet | Russell, Ryan 1969- Mullen, Timothy M. Long, Johnny |
author_role | aut |
author_sort | Russell, Ryan 1969- |
author_variant | r r rr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04764771X (DE-599)KEP04764771X (ORHE)9781597492997 |
dewey-full | 813/.6 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813/.6 |
dewey-search | 813/.6 |
dewey-sort | 3813 16 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03059cam a22006972c 4500</leader><controlfield tag="001">ZDB-30-ORH-04764771X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114428.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2009 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492997</subfield><subfield code="9">978-1-59749-299-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749299X</subfield><subfield code="9">1-59749-299-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080949208</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-094920-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080949207</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-094920-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282737791</subfield><subfield code="9">1-282-73779-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282737792</subfield><subfield code="9">978-1-282-73779-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612737794</subfield><subfield code="9">9786612737794</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6612737794</subfield><subfield code="9">6612737794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764771X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04764771X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597492997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764771X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">813/.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="d">1969-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">the complete series collector's edition</subfield><subfield code="c">Ryan Russell, Timothy Mullen, Johnny Long</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxi, 1038 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--The Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black H</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Short stories, American</subfield><subfield code="y">21st century</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">2000-2099</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques ; Romans, nouvelles, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Romans, nouvelles, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme ; Romans, nouvelles, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nouvelles américaines ; 21e siècle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers ; Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism ; Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Short stories, American ; 21st century</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Short stories, American</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fiction</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mullen, Timothy M.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597492997</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492997</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597492997/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04764771X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 9781597492997 159749299X 9780080949208 0080949207 1282737791 9781282737792 9786612737794 6612737794 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxxi, 1038 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress |
record_format | marc |
spelling | Russell, Ryan 1969- VerfasserIn aut Stealing the network the complete series collector's edition Ryan Russell, Timothy Mullen, Johnny Long Burlington, Mass. Syngress 2009 1 Online-Ressource (xxxi, 1038 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--The Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black H English. Hackers Fiction Computer security Fiction Cyberterrorism Fiction Short stories, American 21st century 2000-2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Cyberterrorisme ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle Computer hackers ; Fiction Computer security ; Fiction Cyberterrorism ; Fiction Short stories, American ; 21st century Hackers Computer security Cyberterrorism Short stories, American Fiction Mullen, Timothy M. MitwirkendeR ctb Long, Johnny MitwirkendeR ctb 9781597492997 Erscheint auch als Druck-Ausgabe 9781597492997 |
spellingShingle | Russell, Ryan 1969- Stealing the network the complete series collector's edition Hackers Fiction Computer security Fiction Cyberterrorism Fiction Short stories, American 21st century 2000-2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Cyberterrorisme ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle Computer hackers ; Fiction Computer security ; Fiction Cyberterrorism ; Fiction Short stories, American ; 21st century Hackers Computer security Cyberterrorism Short stories, American Fiction |
title | Stealing the network the complete series collector's edition |
title_auth | Stealing the network the complete series collector's edition |
title_exact_search | Stealing the network the complete series collector's edition |
title_full | Stealing the network the complete series collector's edition Ryan Russell, Timothy Mullen, Johnny Long |
title_fullStr | Stealing the network the complete series collector's edition Ryan Russell, Timothy Mullen, Johnny Long |
title_full_unstemmed | Stealing the network the complete series collector's edition Ryan Russell, Timothy Mullen, Johnny Long |
title_short | Stealing the network |
title_sort | stealing the network the complete series collector s edition |
title_sub | the complete series collector's edition |
topic | Hackers Fiction Computer security Fiction Cyberterrorism Fiction Short stories, American 21st century 2000-2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Cyberterrorisme ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle Computer hackers ; Fiction Computer security ; Fiction Cyberterrorism ; Fiction Short stories, American ; 21st century Hackers Computer security Cyberterrorism Short stories, American Fiction |
topic_facet | Hackers Fiction Computer security Fiction Cyberterrorism Fiction Short stories, American 21st century 2000-2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Cyberterrorisme ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle Computer hackers ; Fiction Computer security ; Fiction Cyberterrorism ; Fiction Short stories, American ; 21st century Hackers Computer security Cyberterrorism Short stories, American Fiction |
work_keys_str_mv | AT russellryan stealingthenetworkthecompleteseriescollectorsedition AT mullentimothym stealingthenetworkthecompleteseriescollectorsedition AT longjohnny stealingthenetworkthecompleteseriescollectorsedition |