Vai al contenuto principale della pagina
| Autore: |
Rogers Russ
|
| Titolo: |
Hacking a terror network : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor
|
| Pubblicazione: | Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 |
| Edizione: | 1st ed. |
| Descrizione fisica: | 1 online resource (401 p.) |
| Disciplina: | 303.625 |
| 363.325 | |
| 364.16/8 | |
| Soggetto topico: | Terrorism - Computer network resources |
| Soggetto genere / forma: | Thrillers (Fiction) |
| Note generali: | Description based upon print version of record. |
| Nota di contenuto: | Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit |
| Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... | |
| Sommario/riassunto: | Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina |
| Titolo autorizzato: | Hacking a terror network ![]() |
| ISBN: | 9786611035792 |
| 9781281035790 | |
| 1281035793 | |
| 9780080488882 | |
| 0080488889 | |
| 9781597490160 | |
| 1597490164 | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910956999003321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |