Stealing the Network
Johnny Long, Timothy Mullen, Ryan Russell, Scott Pinzon - Collection Black Hat
Résumé
The first three books in this series, Stealing the Network: How to Own the Box, Stealing the Network: How to Own a Continent, and Stealing the Network: How to Own an Identity, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. In Stealing the Network: How to Own a Shadow, Knuth, the master-mind from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own.
From the Diary of Robert Knoll, Senior My son is now here with me. I cannot yet reveal everything to him; he wouldn't understand. Eventually he will come to accept what is his by right and inheritance, but until then, I must be careful how he is treated. Every man wants his work, women, and indulgences. Great men are not complete without a great work. To accomplish a great work, a man should be free from mundane worries. He should have a woman who will support his work and understand his needs. I have arranged to supply Bobby with all of these things. I know the work that will engage and satisfy him. I have a woman for him who will discover and fulfill his desires. He will not have to worry about clothing, food, or shelter. Those will all be supplied. As a practical matter, my direct involvement must be minimal. My constant presence would only hinder his concentration. It would only give him opportunities to question, to doubt. He seems willing to believe my carefully crafted fiction about why I have relocated to Costa Rica. It is important that he not lose faith in me. He needs time to understand his place as a ruler over people. The casino is not only a cover story; the business should prove very profitable and further build our estate. It is a form of slavery. But even a great man must endure a period of training and humility before he ascends to inherit the kingdom of his father.
L'auteur - Johnny Long
Johnny Long has spoken on network security and Google hacking at several computer security conferences around the world including SANS, Defcon, and the Black Hat Briefings. During his recent career with Computer Sciences Corporation (CSC), a leading global IT services company, he has performed active network and physical security assessments for hundreds of government and commercial clients. His website, currently the Internet's largest repository of Google hacking techniques, can be found at http://johnny.ihackstuff.com.
L'auteur - Ryan Russell
is MIS Manager at SecurityFocus.com. He has served as an expert witness on security topics and has done internal security investigation for a major software vendor. Ryan has contributed to three Syngress Media books, on networking topics. He has a degree in computer science from San Francisco State University.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Johnny Long, Timothy Mullen, Ryan Russell, Scott Pinzon |
Collection | Black Hat |
Parution | 23/08/2006 |
Nb. de pages | 410 |
Format | 18 x 23 |
Couverture | Broché |
Poids | 613g |
Intérieur | Noir et Blanc |
EAN13 | 9781597490818 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Bureautique
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet