03214nam 2200613Ia 450 991044990380332120200520144314.01-281-03579-397866110357920-08-048888-91-59749-016-4(CKB)1000000000023675(EBL)218977(OCoLC)61323186(SSID)ssj0000166788(PQKBManifestationID)11180940(PQKBTitleCode)TC0000166788(PQKBWorkID)10161878(PQKB)11041018(MiAaPQ)EBC218977(Au-PeEL)EBL218977(CaPaEBR)ebr10073908(CaONFJC)MIL103579(EXLCZ)99100000000002367520040906d2005 ky 0engur|n|---|||||txtccrHacking a terror network[electronic resource] the silent threat of covert channels /Russ Rogers, Matthew G. Devost, technical editorRockland, MA Syngress Distributed by O'Reilly Mediac20051 online resource (401 p.)Description based upon print version of record.1-928994-98-9 Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for DeceitChapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc....Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combinaTerrorismComputer network resourcesSuspense fictionElectronic books.TerrorismComputer network resources.Suspense fiction.303.625363.325364.16/8Rogers Russ627573MiAaPQMiAaPQMiAaPQBOOK9910449903803321Hacking a terror network1213145UNINA