Stealing the network: how to own the box
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters writt...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
2003
|
Schriftenreihe: | Cyber-Fiction Ser
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781931836876/?ar |
Zusammenfassung: | "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix |
Beschreibung: | "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Print version record |
Umfang: | 1 Online-Ressource (xxii, 303 Seiten) illustrations |
ISBN: | 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048603619 | ||
003 | DE-627-1 | ||
005 | 20240228113857.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2003 xx |||||o 00| ||eng c | ||
020 | |a 1932266682 |c electronic bk. |9 1-932266-68-2 | ||
020 | |a 9781932266689 |c electronic bk. |9 978-1-932266-68-9 | ||
020 | |a 9781931836876 |9 978-1-931836-87-6 | ||
020 | |a 1931836876 |9 1-931836-87-6 | ||
020 | |a 1281056138 |9 1-281-05613-8 | ||
020 | |a 9781281056139 |9 978-1-281-05613-9 | ||
020 | |a 9786611056131 |9 9786611056131 | ||
020 | |a 6611056130 |9 6611056130 | ||
020 | |a 0080481116 |9 0-08-048111-6 | ||
020 | |a 9780080481111 |9 978-0-08-048111-1 | ||
035 | |a (DE-627-1)048603619 | ||
035 | |a (DE-599)KEP048603619 | ||
035 | |a (ORHE)9781931836876 | ||
035 | |a (DE-627-1)048603619 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a FIC |2 bisacsh | |
082 | 0 | |a 813/.54 |2 21 | |
100 | 1 | |a Russell, Ryan |d 1969- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Stealing the network |b how to own the box |c Ryan Russell [and others] |
264 | 1 | |a Rockland, MA |b Syngress |c 2003 | |
300 | |a 1 Online-Ressource (xxii, 303 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Cyber-Fiction Ser | |
500 | |a "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Print version record | ||
520 | |a "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions | ||
520 | |a "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix | ||
546 | |a English. | ||
650 | 0 | |a Hackers |v Fiction | |
650 | 0 | |a Computer security |v Fiction | |
650 | 0 | |a Short stories, American |y 21st century | |
650 | 4 | |a 2000 - 2099 | |
650 | 4 | |a Pirates informatiques ; Romans, nouvelles, etc | |
650 | 4 | |a Sécurité informatique ; Romans, nouvelles, etc | |
650 | 4 | |a Nouvelles américaines ; 21e siècle | |
650 | 4 | |a FICTION ; General | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Short stories, American | |
650 | 4 | |a short stories | |
650 | 4 | |a Short stories | |
650 | 4 | |a Fiction | |
650 | 4 | |a Short stories | |
650 | 4 | |a Nouvelles | |
776 | 1 | |z 1931836876 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1931836876 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781931836876/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048603619 |
---|---|
_version_ | 1829007758838464513 |
adam_text | |
any_adam_object | |
author | Russell, Ryan 1969- |
author_facet | Russell, Ryan 1969- |
author_role | aut |
author_sort | Russell, Ryan 1969- |
author_variant | r r rr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048603619 (DE-599)KEP048603619 (ORHE)9781931836876 |
dewey-full | 813/.54 |
dewey-hundreds | 800 - Literature (Belles-lettres) and rhetoric |
dewey-ones | 813 - American fiction in English |
dewey-raw | 813/.54 |
dewey-search | 813/.54 |
dewey-sort | 3813 254 |
dewey-tens | 810 - American literature in English |
discipline | Anglistik / Amerikanistik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03936cam a22007092c 4500</leader><controlfield tag="001">ZDB-30-ORH-048603619</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113857.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266682</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-68-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266689</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-68-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836876</subfield><subfield code="9">978-1-931836-87-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836876</subfield><subfield code="9">1-931836-87-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281056138</subfield><subfield code="9">1-281-05613-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281056139</subfield><subfield code="9">978-1-281-05613-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611056131</subfield><subfield code="9">9786611056131</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611056130</subfield><subfield code="9">6611056130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080481116</subfield><subfield code="9">0-08-048111-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080481111</subfield><subfield code="9">978-0-08-048111-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048603619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048603619</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781931836876</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048603619</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">FIC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">813/.54</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="d">1969-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Stealing the network</subfield><subfield code="b">how to own the box</subfield><subfield code="c">Ryan Russell [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 303 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cyber-Fiction Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Short stories, American</subfield><subfield code="y">21st century</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">2000 - 2099</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques ; Romans, nouvelles, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Romans, nouvelles, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nouvelles américaines ; 21e siècle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FICTION ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Short stories, American</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">short stories</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Short stories</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Short stories</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nouvelles</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1931836876</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1931836876</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781931836876/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048603619 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:24Z |
institution | BVB |
isbn | 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxii, 303 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress |
record_format | marc |
series2 | Cyber-Fiction Ser |
spelling | Russell, Ryan 1969- VerfasserIn aut Stealing the network how to own the box Ryan Russell [and others] Rockland, MA Syngress 2003 1 Online-Ressource (xxii, 303 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyber-Fiction Ser "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one."--Foreword. - Print version record "Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions "Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real"--Page xix English. Hackers Fiction Computer security Fiction Short stories, American 21st century 2000 - 2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle FICTION ; General Hackers Computer security Short stories, American short stories Short stories Fiction Nouvelles 1931836876 Erscheint auch als Druck-Ausgabe 1931836876 |
spellingShingle | Russell, Ryan 1969- Stealing the network how to own the box Hackers Fiction Computer security Fiction Short stories, American 21st century 2000 - 2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle FICTION ; General Hackers Computer security Short stories, American short stories Short stories Fiction Nouvelles |
title | Stealing the network how to own the box |
title_auth | Stealing the network how to own the box |
title_exact_search | Stealing the network how to own the box |
title_full | Stealing the network how to own the box Ryan Russell [and others] |
title_fullStr | Stealing the network how to own the box Ryan Russell [and others] |
title_full_unstemmed | Stealing the network how to own the box Ryan Russell [and others] |
title_short | Stealing the network |
title_sort | stealing the network how to own the box |
title_sub | how to own the box |
topic | Hackers Fiction Computer security Fiction Short stories, American 21st century 2000 - 2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle FICTION ; General Hackers Computer security Short stories, American short stories Short stories Fiction Nouvelles |
topic_facet | Hackers Fiction Computer security Fiction Short stories, American 21st century 2000 - 2099 Pirates informatiques ; Romans, nouvelles, etc Sécurité informatique ; Romans, nouvelles, etc Nouvelles américaines ; 21e siècle FICTION ; General Hackers Computer security Short stories, American short stories Short stories Fiction Nouvelles |
work_keys_str_mv | AT russellryan stealingthenetworkhowtoownthebox |