Skip to content
You are not logged in |Login  

LEADER 00000cam  2200685Ii 4500 
001    ocm64185718  
003    OCoLC 
005    20160518080126.7 
006    m     o  d         
007    cr cnu---unuuu 
008    060221s2005    maua   fo     000 j eng d 
019    133169152|a162597214|a181421155|a183265839|a473077367
       |a475327188|a507575138|a560015347|a606029734|a647464703
       |a712973698|a722429562|a740946990|a765142545|a824885559
       |a856952115 
020    1423754190|q(electronic bk.) 
020    9781423754190|q(electronic bk.) 
024 1  792502900673 
035    (OCoLC)64185718|z(OCoLC)133169152|z(OCoLC)162597214
       |z(OCoLC)181421155|z(OCoLC)183265839|z(OCoLC)473077367
       |z(OCoLC)475327188|z(OCoLC)507575138|z(OCoLC)560015347
       |z(OCoLC)606029734|z(OCoLC)647464703|z(OCoLC)712973698
       |z(OCoLC)722429562|z(OCoLC)740946990|z(OCoLC)765142545
       |z(OCoLC)824885559|z(OCoLC)856952115 
040    N$T|beng|epn|erda|cN$T|dOCLCQ|dYDXCP|dOCLCQ|dTUU|dOCLCQ
       |dOCLCO|dOCLCQ|dOPELS|dMERUC|dCCO|dE7B|dIDEBK|dCOCUF
       |dBAKER|dCOO|dDKDLA|dZCU|dCSU|dB24X7|dUMI|dDEBSZ|dOCLCA
       |dOCLCO|dOCLCQ|dAU@|dOCLCF|dOCL|dOCLCO|dOCLCQ|dN$T|dOCLCO 
049    GTKE 
050  4 PS648.C65|bS742 2005eb 
082 04 [Fic]|222 
245 00 Stealing the network :|bhow to own an identity /|cRaven 
       Alder [and others] ; Timothy Mullen (Thor), contributing 
       author and technical editor ; Johnny Long, contributing 
       author and technical editor. 
246 1  |iAdded cover title:|aYou are who the computer says you 
       are 
264  1 Rockland, MA :|bSyngress ;|c[2005] 
264  2 [Sebastopol, CA] :|bDistributed by O'Reilly Media,|c[2005]
264  4 |c©2005 
300    1 online resource (xxiv, 333 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  Stealing the Network Ser. 
505 0  pt. 1 Evasion: Prologue from the diary of Robert Knoll, 
       Senior / Ryan Russell ; In the beginning ... / Caezar as 
       The Woman With No Name ; Sins of the father / Ryan Russell
       as Robert ; Saul on the run / Chris Hurley as Saul ; The 
       seventh wave / Thor as Ryan ; Bl@ckToW3r / Brian Hatch as 
       Glenn ; The Java SCript Café / Raven Alder as Natasha ; 
       Death by a thousand cuts / Johnny Long with Anthony 
       Kokocinski ; A really gullible genius makes amends / Jay 
       Beale as Flir ; Near miss / Tom Parker as Carlton ; 
       There's something else / Johnny Long with Anthony 
       Kokocinski ; Epilogue : The chase / Johnny Long -- part 2.
       Behind the scenes: The conversation / Jeff Moss as Tom ; 
       Social insecurity / Thor. 
520    The first two books in this series Stealing the Network: 
       How to Own the Box and Stealing the Network: How to Own a 
       Continent have become classics in the Hacker and Infosec 
       communities because of their chillingly realistic 
       depictions of criminal hacking techniques. In this third 
       installment, the all-star cast of authors tackle one of 
       the fastest growing crimes in the world: Identity Theft. 
       Now, the criminal hackers readers have grown to both love 
       and hate try to cover their tracks and vanish into thin 
       air "Stealing the Network: How to Own an Identity" is the 
       3rd book in the "Stealing" series, and continues in the 
       tradition created by its predecessors by delivering real-
       world network attack methodologies and hacking techniques 
       within a context of unique and original fictional accounts
       created by some of the world's leading security 
       professionals and computer technologists. The seminal 
       works in TechnoFiction, this "STN" collection yet again 
       breaks new ground by casting light upon the mechanics and 
       methods used by those lurking on the darker side of the 
       Internet, engaging in the fastest growing crime in the 
       world: Identity theft. Cast upon a backdrop of "Evasion," 
       surviving characters from "How to Own a Continent" find 
       themselves on the run, fleeing from both authority and 
       adversary, now using their technical prowess in a way they
       never expected--to survive. * The first two books in the 
       series were best-sellers and have established a cult 
       following within the Hacker and Infosec communities * 
       Identity theft is the fastest growing crime in the world, 
       and financial loss from identity theft is expected to 
       reach $2 trillion by the end of 2005 * All of the authors 
       on the book are world renowned, highly visible information
       security experts who present at all of the top security 
       conferences including Black Hat, DefCon, and RSA and write
       for the most popular magazines and Web sites including 
       Information Security Magazine, and SecurityFocus.com. All 
       of these outlets will be used to promote the book. 
588 0  Print version record. 
650  0 Identity theft|vFiction. 
650  0 Computer crimes|vFiction. 
650  0 Hackers|vFiction. 
650  0 Computer security|vFiction. 
650  0 Hackers|xPsychology|vFiction. 
650  0 Identity theft. 
650  0 Computer crimes. 
650  0 Hackers. 
650  0 Computer security. 
650  0 Hackers|xPsychology. 
650  0 Cyberterrorism|vFiction. 
650  7 Computer crimes.|2fast|0(OCoLC)fst00872063 
650  7 Computer security.|2fast|0(OCoLC)fst00872484 
650  7 Hackers.|2fast|0(OCoLC)fst00872150 
650  7 Hackers|xPsychology.|2fast|0(OCoLC)fst00872151 
650  7 Identity theft.|2fast|0(OCoLC)fst01201137 
650  7 FICTION / General.|2bisacsh 
655  7 Fiction.|2fast|0(OCoLC)fst01423787 
700 1  Alder, Raven. 
700 1  Mullen, Timothy M. 
700 1  Long, Johnny. 
776 08 |iPrint version:|tStealing the network.|dRockland, MA : 
       Syngress ; [Sebastopol, CA] : Distributed by O'Reilly 
       Media, ©2005|z1597490067|w(OCoLC)60320855 
830  0 Stealing the Network Ser. 
914    ocm64185718 
994    93|bGTK 
Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO