Stealing the network how to own a shadow: the chase for Knuth /

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a...

Full description

Main Author: Long, Johnny.
Other Authors: Russell, Ryan, 1969-, Mullen, Timothy M., Pinzon, D. Scott., Black Hat Press (Goodhue, Minn.)
Format: eBook
Language: English
Published: Rockland, Mass. : Syngress, 2007.
Physical Description: 1 online resource (xxxvi, 409 pages) : illustrations.
Subjects:
LEADER 05653cam a2200745Ia 4500
001 162597508
003 OCoLC
005 20180526100323.8
006 m o d
007 cr cn|||||||||
008 070806s2007 maua o 000 1 eng d
019 |a 182738819  |a 606033349  |a 856960584 
020 |a 9781597490818 
020 |a 1597490814 
035 |a (OCoLC)162597508  |z (OCoLC)182738819  |z (OCoLC)606033349  |z (OCoLC)856960584 
037 |a 133969:134095  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d OCLCF  |d OCLCA  |d OCL  |d UAB  |d B24X7  |d OCLCQ  |d LIV  |d OCLCQ  |d OCLCA 
049 |a COM6 
050 4 |a PS3612.O497  |b S747 2007eb 
082 0 4 |a 005.8  |2 22 
100 1 |a Long, Johnny. 
245 1 0 |a Stealing the network :  |b how to own a shadow: the chase for Knuth /  |c Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor]. 
246 3 0 |a How to own a shadow. 
264 1 |a Rockland, Mass. :  |b Syngress,  |c 2007. 
300 |a 1 online resource (xxxvi, 409 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
520 |a The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries. 
500 |a "Black hat"--Cover. 
500 |a " ... fourth book in the "Stealing the network series."--Preface. 
500 |a Sequel to: Stealing the network : how to own an identity. 
520 |a This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page. 
505 0 0 |t Travel plans --  |t Back in the saddle --  |t Old man and a ghost --  |t Rootkit --  |g Paul--  |t Birth of Pawn --  |t Dishonorable discharge --  |t McGaylver --  |g Appendix :  |t Flashback to Knuth. 
588 0 |a Print version record. 
590 |a Elsevier  |b ScienceDirect All Books. 
650 0 |a Hackers  |v Fiction. 
650 0 |a Computer security  |v Fiction. 
650 0 |a Cyberterrorism  |v Fiction. 
650 7 |a Hackers.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Cyberterrorism.  |2 fast. 
655 4 |a Electronic books. 
655 7 |a Fiction.  |2 fast. 
655 7 |a Fiction.  |2 lcgft. 
700 1 |a Russell, Ryan,  |d 1969- 
700 1 |a Mullen, Timothy M. 
700 1 |a Pinzon, D. Scott. 
710 2 |a Black Hat Press (Goodhue, Minn.) 
776 0 8 |i Print version:  |a Long, Johnny.  |t Stealing the network.  |d Rockland, Mass. : Syngress, 2007  |z 1597490814  |z 9781597490818  |w (OCoLC)82899565. 
907 |a .b49842730  |b multi  |c -  |d 160302  |e 230104 
998 |a cue  |a cu  |b 180626  |c m  |d z   |e -  |f eng  |g mau  |h 0  |i 2 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.netlib2 in 2016 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 180626  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Elsevier  |1 .i119610760  |u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9781597490818  |3 Elsevier  |z Click here for access