Hacking a Terror Network
The Silent Threat of Covert Channels
Russ Rogers, Matthew G. Devost - Collection 4 Free Booklets Your Solutions Membership
Résumé
Could you find a hidden terrorist message in time to save innocent lives?
In Hacking a Terror Network, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of attacks. While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world. It makes for a great read as well as providing a blueprint to the workings of covert channels. Most importantly, it describes how law enforcement agencies and intelligence organizations can detect, defend and destroy threats. This book is packed with real-life examples of how tools work, including screenshots and narrative tutorials. Both amateurs and seasoned security professionals will benefit from reading this book, -from the Foreword by Matthew G. Devost, President and CEO, Terrorism Research Center, Inc.
There is a plot underway to attack American interests...
A decade-old grudge against the West comes to fruition as a child follows the path of the father's hatred for America and vows to avenge a brother. The American dream is in danger and can be saved only through the diligence and imagination of one man. An American agent suspects a plot but needs to prove it in order to draw attention to the danger. But how are the terrorists communicating? He needs to break the code to stop the plot that could kill thousands of innocent people.
L'auteur - Russ Rogers
Russ Rogers is a Co-Founder, Chief Executive Officer, and Principal Security Consultant for Security Horizon, Inc., a Colorado-based professional security services and training provider and veteran-owned small business. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. He served as a Certified Arabic Linguist during his time in the military and is also the editor-in-chief of The Security Journal and staff member for the Black Hat Briefings. Russ is a member of the Information System Security Association and the Information System Audit and Control Association.
L'auteur - Matthew G. Devost
Matthew Devost is President and CEO of the Terrorism Research Center, Inc. Previously, Matthew was the Director of Operations for Professional Services at Counterpane Internet Security as well as Security Design International, Inc., where he led a team of technical information security consultants providing vulnerability assessments and information security consulting services to international corporations and governments. In addition, he worked as the Director of Intelligence Analysis for (Defense, a Senior INFOSEC Engineer at SAIC, and as a U.S. Customs Inspector. He serves on the Defense Science Board Task Force on Critical Homeland Infrastructure Protection. Matthew serves as a Senior Advisor to the Airline Pilots Association National Security Committee, sits on the Board of Directors as a Founding Member of the Cyber Conflict Studies Association, and is an adjunct member of the Los Angeles Terrorism Early Warning Group.
Sommaire
- The Mind of Terror
- Unseen Planning
- Making Friends
- One Step Closer
- Over the Line
- Images of Death
- The Real Assignment
- Creating the Code
- Over the Edge
- Biding Time
- Covert Channels
- Facing the Truth
- Taking Command
- Racing the Clock
- Losing Control
- Heightened Motivation
- Chasing Ghosts
- Taking Back Control
- Vengeance for Deceit
- Eliminating False Positives
- Gaining a Finger Hold
- Compressing Timelines
- A Plan Comes Together
- Turning Fiction into Reality
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Russ Rogers, Matthew G. Devost |
Collection | 4 Free Booklets Your Solutions Membership |
Parution | 14/02/2005 |
Nb. de pages | 364 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 663g |
Intérieur | Noir et Blanc |
EAN13 | 9781928994985 |
ISBN13 | 978-1-928994-98-5 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet