LEADER 04917nam 2200745 450 001 9910797485803321 005 20200520144314.0 010 $a0-12-804282-6 035 $a(CKB)3710000000448993 035 $a(EBL)2098440 035 $a(SSID)ssj0001561958 035 $a(PQKBManifestationID)16204694 035 $a(PQKBTitleCode)TC0001561958 035 $a(PQKBWorkID)14833321 035 $a(PQKB)10374193 035 $a(Au-PeEL)EBL2098440 035 $a(CaPaEBR)ebr11080521 035 $a(CaONFJC)MIL822747 035 $a(OCoLC)914301019 035 $a(CaSebORM)9780128042823 035 $a(MiAaPQ)EBC2098440 035 $a(PPN)198685548 035 $a(EXLCZ)993710000000448993 100 $a20150730h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDissecting the hack $ethe V3rb0ten network /$fJayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin ; contributors, Brittney Jordan [and five others] 205 $a1st edition 210 1$aAmsterdam, Netherlands :$cSyngress,$d2015. 210 4$d©2015 215 $a1 online resource (306 p.) 300 $aDescription based upon print version of record. 311 $a0-12-804278-8 320 $aIncludes bibliographical references. 327 $aFront Cover; Dissecting the Hack; Copyright Page; Dedication; Contents; List of Contributors; About the Authors; Foreword; Acknowledgments; About the Book; 1 The V3rb0t3n Network; Prologue; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Epilogue; 2 Interview Interlude; Adam Laurie Co-Founder and Director of Aperture Labs Ltd.; Thomas Lim Founder and CEO of COSEINC; Josh Thomas Chief Breaker & Partner at Atredis Partners; 3 Star; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography 327 $aSSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC 327 $aPentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance 327 $a3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings 330 $aDissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network,"" continues the fic 606 $aComputer crimes$vCase studies 606 $aComputer crimes$xInvestigation 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aHackers 615 0$aComputer crimes 615 0$aComputer crimes$xInvestigation. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aHackers. 676 $a364.168 700 $aStreet$b Jayson E.$01544801 702 $aSims$b Kristin 702 $aBaskin$b Brian 702 $aMartin$b Brian 702 $aJordan$b Brittney 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910797485803321 996 $aDissecting the hack$93799299 997 $aUNINA LEADER 00469oas 2200193z- 450 001 9910890819703321 005 20200228204946.0 035 $a(CKB)1000000000022910 035 $a(DE-599)ZDB2185433-6 035 $a(EXLCZ)991000000000022910 100 $a20171002cuuuuuuuu -u- - 101 0 $aeng 200 00$aBibliosfera 210 $aSofiâ$cNBU 311 $a1311-8803 906 $aJOURNAL 912 $a9910890819703321 996 $aBibliosfera$94159187 997 $aUNINA LEADER 03151oam 2200565I 450 001 9910164938203321 005 20210510171220.0 010 $a1-315-57656-2 010 $a1-317-15264-6 010 $a0-7546-9201-9 024 8 $a10.4324/9781315576565 035 $a(CKB)3710000001059954 035 $a(MiAaPQ)EBC4809690 035 $a(OCoLC)973223105 035 $a(PPN)199487545 035 $a(BIP)56537688 035 $a(BIP)12681745 035 $a(EXLCZ)993710000001059954 100 $a20180706d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aDesign against crime $ea human-centred approach to designing for safety and security /$fCaroline L. Davey and Andrew B. Wootton 205 $aFirst edition. 210 1$aLondon ;$aNew York :$cRoutledge,$d2017. 215 $a1 online resource (164 pages) $cillustrations, tables 225 1 $aDesign for Social Responsibility 311 08$a0-7546-4501-0 311 08$a1-317-15265-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $apt. I. Introducing design against crime -- pt. II. Addressing crime prevention within the design process -- pt. III. Using design to address crime and security issues -- pt. IV. Applications and futures. 330 $aDesign Against Crime will aid the design profession to meet the challenges presented by the competing needs and complex systems around crime and security. It proposes that designers should use their creative talents to develop innovative solutions to security problems that contribute to the ongoing fight against crime.? The authors first explain the design against crime approach to security and security. They go on to provide practical advice on addressing crime and insecurity within the design process and offer practical examples of design being applied to security and safety. They also examine crime victimisation from a global perspective, highlighting the benefits worldwide of reducing opportunities for crime, including issues of national security, such as terrorism and natural disasters.?? A design-led, human-centred approach provides a way forward that is both aspirational and practical. The book is aimed primarily at design professionals, educators and students interested in safety and security, from all design disciplines, including product design, architecture, service design and communication design. The book should also be read by crime prevention experts, planners, local authorities, managers of urban environments and policymakers. 410 0$aDesign for social responsibility series. 606 $aCrime prevention 606 $aSecurity systems 615 0$aCrime prevention. 615 0$aSecurity systems. 676 $a364.4 700 $aDavey$b Caroline L.$0933327 701 $aWootton$b Andrew B$0933328 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 801 2$bUK-SaU 906 $aBOOK 912 $a9910164938203321 996 $aDesign against crime$92100825 997 $aUNINA