03279nam 2200661Ia 450 991095699900332120250429171904.09786611035792978128103579012810357939780080488882008048888997815974901601597490164(CKB)1000000000023675(EBL)218977(OCoLC)61323186(SSID)ssj0000166788(PQKBManifestationID)11180940(PQKBTitleCode)TC0000166788(PQKBWorkID)10161878(PQKB)11041018(MiAaPQ)EBC218977(Au-PeEL)EBL218977(CaPaEBR)ebr10073908(CaONFJC)MIL103579(EXLCZ)99100000000002367520040906d2005 ky 0engur|n|---|||||txtccrHacking a terror network the silent threat of covert channels /Russ Rogers, Matthew G. Devost, technical editor1st ed.Rockland, MA Syngress Distributed by O'Reilly Mediac20051 online resource (401 p.)Description based upon print version of record.9781928994985 1928994989 Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for DeceitChapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc....Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combinaTerrorismComputer network resourcesThrillers (Fiction)TerrorismComputer network resources.303.625363.325364.16/8363.325Rogers Russ627573MiAaPQMiAaPQMiAaPQBOOK9910956999003321Hacking a terror network1213145UNINA