Flylib.com
Stealing the Network. How to Own a Continent
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Table of Contents
BackCover
Stealing the Network - How to Own a Continent
Foreword
Chapter 1: Control Yourself
Discipline
Shelter
Just Because You re Paranoid...
Day minus 300
Day Minus 200
Day Minus 100
Day Minus 50
The Beginning... The Man Appears
Chapter 2: The Lagos Creeper Box
NOC NOC, Who s There?
Doing the Meat Thing
Aftermath... The Last Diary Entry of Demetri Fernandez
Chapter 3: Product of Fate: The Evolution of a Hacker
Interest Piqued: The Fire Is Started
What? You ve Got To Be Kidding Me
You Want Me To Do What?
It Was Only Harmless Fun...
Reaping the Rewards: A Little Bit Goes a Long Way
Money - The Root of All Evil
Innocence Lured
Spreading the Net Wide
Making Plans
Plans Become Actions
Breaking the Code
Choosing the Equipment
Working with Friends
Stepping Way over the Line
Aftermath... Report of an Audit
Chapter 4: A Real Gullible Genius
Day 1: Thoughts and Recon
Day 2: Deploying the Rogue
Day 3: Accessing the Network
Day 4: Busting Root on the Apple
Day 5: Over 20,000 Social Security Numbers
Flir s Late Night
Later that Morning...
Retracting the Tendrils
Epilogue
Aftermath... Security - A People Problem
Chapter 5: For Whom Ma Bell Tolls
The Call
Maxim s
Shall We Play a Game?
The Booty
The Switch
The Drop
The Marketplace
Landline
Keys to the Kingdom
Inside the Golden Pyramid
Wiretap
Aftermath
Aftermath... The Investigation
Chapter 6: Return on Investment
Playing the Market
Information Leakage at the Packet Level
Corrupted by Greed
Revenge of the Nerd
A Lead from Las Vegas
The Call of Opportunity
Initial Reconnaissance
Shrax: The Ultimate Rootkit
Throwaway Account
Seeking the Prize
Hacking .MIL
Triumph and New Toys
Aftermath...The Investigation Continues
Chapter 7: h3X and The Big Picture
Exceptional Circumstances
Evolution and Lack Thereof
HyperText Target Protocol
Setup.exe
Hard Work
Working on Weekends
RD
Don t like Mondays
Aftermath... The Knuth Perspective
Chapter 8: The Story of Dex
A New Day - A New Dollar
The Hunt
The Real Fun Begins
Ralph Bechie
Robert Montague
Niklas Fleschier
Reality Comes Back
Aftermath... The Watchers
Chapter 9: Automatic Terror Machine
The Games Begin
An Army of One
Let s Get Physical
Of Greed and Girls
A Worm by Any Other Name
Human after All
Chapter 10: Get Out Quick
Day Plus 1
Time Zone Unknown
Appendix: The Making of STC
List of Figures
List of Code
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Performing the Assessment
Preparing for Analysis
Procurement Terminology
SIRT Incident Report
A Practitioners Guide to Software Test Design
Case Studies
Section I - Black Box Testing Techniques
Test Planning
Appendix A Brown & Donaldson Case Study
Appendix B Stateless University Registration System Case Study
Developing Tablet PC Applications (Charles River Media Programming)
The Tablet PC
Introduction to Visual Basic .NET
Introduction to the VB .NET Language
Not Quite a Magic Ball
Using Third-Party Engines
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based HR Planning
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix B Further Suggestions on Employee Development
Appendix D Employee Development and Succession Management
Extending and Embedding PHP
Automatic Type Conversion with zend_parse_parameters()
Accessing Streams
The Embed SAPI
Advanced Embedding
Summary
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Circuit-Switched Networks
Whats Next on the Internet
Wireless Broadband
3G: Moving Toward Broadband Wireless
Mobile TV
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies