E-Book, Englisch, 448 Seiten, Web PDF
Rogers / Devost Hacking a Terror Network: The Silent Threat of Covert Channels
1. Auflage 2005
ISBN: 978-0-08-048888-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 448 Seiten, Web PDF
ISBN: 978-0-08-048888-2
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic insider's look into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to hack along with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to hack along with the fictional narrative within the book to decrypyt.
Autoren/Hrsg.
Weitere Infos & Material
1;Cover;1
2;Contents;12
3;Foreword;18
4;Prologue;22
5;Chapter 1: The Mind of Terror;25
6;Chapter 2: Unseen Planning;40
7;Chapter 3: Making Friends;55
8;Chapter 4: One Step Closer;62
9;Chapter 5: Over the Line;66
10;Chapter 6: Images of Death;82
11;Chapter 7: The Real Assignment;87
12;Chapter 8: Creating the Code;104
13;Chapter 9: Over the Edge;114
14;Chapter 10: Biding Time;125
15;Chapter 11: Covert Channels;148
16;Chapter 12: Facing the Truth;183
17;Chapter 13: Taking Command;194
18;Chapter 14: Racing the Clock;220
19;Chapter 15: Losing Control;234
20;Chapter 16: Heightened Motivation;257
21;Chapter 17: Chasing Ghosts;265
22;Chapter 18: Taking Back Control;303
23;Chapter 19: Vengeance for Deceit;318
24;Chapter 20: Eliminating False Positives;325
25;Chapter 21: Gaining a Finger Hold;334
26;Chapter 22: Compressing Timelines;339
27;Chapter 23: A Plan Comes Together;354
28;Chapter 24: Turning Fiction into Reality;362
29;Glossary;376
30;Other books from Russ Rogers and Security Horizon, Inc.…;394




