Stealing The Network : (Record no. 574449)

MARC details
000 -LEADER
fixed length control field 02632nam a22001817a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250701b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781597490061
Paper back/Hardbound pbk
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.65
Item number AID
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Alder Raven
245 ## - TITLE STATEMENT
Title Stealing The Network :
Sub Title : how to own an identity
Statement of responsibility, etc Raven Alder, Timothy M. Mullen, Johnny Long
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Rockland Ma
Name of publisher Syngress ; Distributed By O'reilly Media,
Year of publication 2005
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxiv; 333 p.
Dimensions 23 cm
520 ## - SUMMARY, ETC.
Summary, etc The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Crimes Computer Crimes Fiction Computer Security Computer Security Fiction
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession Number Price effective from Koha item type
        Anna Centenary Library Anna Centenary Library 3RD FLOOR, A WING 08.11.2010 004.65 AID 350267 01.07.2025 Reference

Find us on the map