LEADER 03214nam 2200613Ia 450 001 9910449903803321 005 20200520144314.0 010 $a1-281-03579-3 010 $a9786611035792 010 $a0-08-048888-9 010 $a1-59749-016-4 035 $a(CKB)1000000000023675 035 $a(EBL)218977 035 $a(OCoLC)61323186 035 $a(SSID)ssj0000166788 035 $a(PQKBManifestationID)11180940 035 $a(PQKBTitleCode)TC0000166788 035 $a(PQKBWorkID)10161878 035 $a(PQKB)11041018 035 $a(MiAaPQ)EBC218977 035 $a(Au-PeEL)EBL218977 035 $a(CaPaEBR)ebr10073908 035 $a(CaONFJC)MIL103579 035 $a(EXLCZ)991000000000023675 100 $a20040906d2005 ky 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking a terror network$b[electronic resource] $ethe silent threat of covert channels /$fRuss Rogers, Matthew G. Devost, technical editor 210 $aRockland, MA $cSyngress $cDistributed by O'Reilly Media$dc2005 215 $a1 online resource (401 p.) 300 $aDescription based upon print version of record. 311 $a1-928994-98-9 327 $aCover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit 327 $aChapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... 330 $aWritten by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina 606 $aTerrorism$xComputer network resources 606 $aSuspense fiction 608 $aElectronic books. 615 0$aTerrorism$xComputer network resources. 615 0$aSuspense fiction. 676 $a303.625 676 $a363.325 676 $a364.16/8 700 $aRogers$b Russ$0627573 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910449903803321 996 $aHacking a terror network$91213145 997 $aUNINA