Hacking a Terror Network: The Silent Threat of Covert Channels -  Matthew G Devost,  Russ Rogers

Hacking a Terror Network: The Silent Threat of Covert Channels (eBook)

eBook Download: PDF
2005 | 1. Auflage
448 Seiten
Elsevier Science (Verlag)
978-0-08-048888-2 (ISBN)
Systemvoraussetzungen
33,37 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic insider's look into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to hack along with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.

Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.

Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to hack along with the fictional narrative within the book to decrypyt.
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "e;insider's look"e; into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "e;hack along"e; with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "e;hack along"e; with the fictional narrative within the book to decrypyt.

Cover 1
Contents 12
Foreword 18
Prologue 22
Chapter 1: The Mind of Terror 25
Chapter 2: Unseen Planning 40
Chapter 3: Making Friends 55
Chapter 4: One Step Closer 62
Chapter 5: Over the Line 66
Chapter 6: Images of Death 82
Chapter 7: The Real Assignment 87
Chapter 8: Creating the Code 104
Chapter 9: Over the Edge 114
Chapter 10: Biding Time 125
Chapter 11: Covert Channels 148
Chapter 12: Facing the Truth 183
Chapter 13: Taking Command 194
Chapter 14: Racing the Clock 220
Chapter 15: Losing Control 234
Chapter 16: Heightened Motivation 257
Chapter 17: Chasing Ghosts 265
Chapter 18: Taking Back Control 303
Chapter 19: Vengeance for Deceit 318
Chapter 20: Eliminating False Positives 325
Chapter 21: Gaining a Finger Hold 334
Chapter 22: Compressing Timelines 339
Chapter 23: A Plan Comes Together 354
Chapter 24: Turning Fiction into Reality 362
Glossary 376
Other books from Russ Rogers and Security Horizon, Inc.… 394

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99