Hacking a terror network [[electronic resource] ] : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor |
Autore | Rogers Russ |
Pubbl/distr/stampa | Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina |
303.625
363.325 364.16/8 |
Soggetto topico |
Terrorism - Computer network resources
Suspense fiction |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03579-3
9786611035792 0-08-048888-9 1-59749-016-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit
Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... |
Record Nr. | UNINA-9910449903803321 |
Rogers Russ
![]() |
||
Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacking a terror network [[electronic resource] ] : the silent threat of covert channels / / Russ Rogers, Matthew G. Devost, technical editor |
Autore | Rogers Russ |
Pubbl/distr/stampa | Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina |
303.625
363.325 364.16/8 |
Soggetto topico | Terrorism - Computer network resources |
Soggetto genere / forma | Thrillers (Fiction) |
ISBN |
1-281-03579-3
9786611035792 0-08-048888-9 1-59749-016-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit
Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... |
Record Nr. | UNINA-9910783275803321 |
Rogers Russ
![]() |
||
Rockland, MA, : Syngress, : Distributed by O'Reilly Media, c2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers |
Autore | Rogers Russ |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2004 |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Information technology - Management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05637-5
9786611056377 0-08-048082-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles |
Record Nr. | UNINA-9910455724903321 |
Rogers Russ
![]() |
||
Rockland, MA, : Syngress Publishing, c2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security assessment [[electronic resource] ] : case studies for implementing the NSA lAM / / Russ Rogers |
Autore | Rogers Russ |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2004 |
Descrizione fisica | 1 online resource (465 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Information technology - Management |
ISBN |
1-281-05637-5
9786611056377 0-08-048082-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Introduction; Chapter 1 Laying the Foundation for Your Assessment; Chapter 2 The Pre-Assessment Visit; Chapter 3 Determining the Organization's Information Criticality; Chapter 4 System Information Criticality; Chapter 5 The System Security Environment; Chapter 6 Understanding the Technical Assessment Plan; Chapter 7 Customer Activities; Chapter 8 Managing the Findings; Chapter 9 Leaving No Surprises; Chapter 10 Final Reporting; Chapter 11 Tying Up Loose Ends; Appendix A Forms, Worksheets, and Templates; Index; Related Titles |
Record Nr. | UNINA-9910780114003321 |
Rogers Russ
![]() |
||
Rockland, MA, : Syngress Publishing, c2004 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|