Stealing the network : how to own a shadow: the chase for Knuth / Johnny Long, Timothy (Thor) Mullen, Ryan Russell ; [D. Scott Pinzon, story editor].
Material type: TextSeries: Stealing the networkPublication details: Rockland, Mass. : Syngress, 2007.Description: xxxvi, 409 p. : ill. ; 24 cmISBN:- 1597490814 (pbk.)
- 9781597490818 (pbk.)
- How to own a shadow
- 813 SYN
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Standard Loan | Moylish Library Fiction Collection | 813 SYN (Browse shelf(Opens below)) | 1 | Available | 39002100387209 |
Enhanced descriptions from Syndetics:
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief , Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page.
Sequel to: Stealing the network : how to own an identity.
This is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous titles, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from game stations, printers, and fax machines to service provider class switches and routers to steal, deceive, and obfuscate. From physical security to open source information gathering, this book will entertain and educate the reader on every page.