MARC details
000 -LEADER |
fixed length control field |
05366cam a2200661Ii 4500 |
001 - |
control field |
ocn914301019 |
003 - |
control field |
OCoLC |
005 - |
control field |
20190719103139.0 |
006 - |
fixed length control field |
m o d |
007 - |
fixed length control field |
cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150723t20152015mau ob 000 0 eng d |
040 ## - |
-- |
N$T |
-- |
eng |
-- |
rda |
-- |
pn |
-- |
N$T |
-- |
N$T |
-- |
IDEBK |
-- |
EBLCP |
-- |
YDXCP |
-- |
OPELS |
-- |
OCLCF |
-- |
TEFOD |
-- |
COO |
-- |
OCLCQ |
-- |
MERUC |
-- |
OCLCQ |
-- |
U3W |
-- |
OCLCA |
-- |
WRM |
-- |
D6H |
-- |
VT2 |
-- |
AU@ |
-- |
OCLCQ |
-- |
WYU |
-- |
MERER |
-- |
CUY |
-- |
LOA |
-- |
ZCU |
-- |
G3B |
-- |
CNCEN |
-- |
S8J |
-- |
ICG |
-- |
K6U |
-- |
COCUF |
-- |
OCLCQ |
-- |
CNNOR |
-- |
DKC |
019 ## - |
-- |
914433830 |
-- |
945800186 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128042823 |
Qualifying information |
(electronic bk.) |
|
International Standard Book Number |
0128042826 |
Qualifying information |
(electronic bk.) |
|
International Standard Book Number |
0128042788 |
|
International Standard Book Number |
9780128042786 |
|
-- |
9780128042786 |
035 ## - |
-- |
(OCoLC)914301019 |
-- |
(OCoLC)914433830 |
-- |
(OCoLC)945800186 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
-- |
HV8079.C65 |
072 #7 - |
-- |
SOC |
-- |
004000 |
-- |
bisacsh |
082 04 - |
Classification number |
364.16/8 |
-- |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Street, Jayson E., |
245 10 - TITLE STATEMENT |
Title |
Dissecting the hack : |
Remainder of title |
the v3rb0ten network / |
Statement of responsibility, etc |
Jayson E. Street, Kristin Sims, Brian Baskin ; technical editor, Brian Martin. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
505 0# - |
Formatted contents note |
Front Cover; Dissecting the Hack; Copyright Page; Dedication; Contents; List of Contributors; About the Authors; Foreword; Acknowledgments; About the Book; 1 The V3rb0t3n Network; Prologue; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Epilogue; 2 Interview Interlude; Adam Laurie Co-Founder and Director of Aperture Labs Ltd.; Thomas Lim Founder and CEO of COSEINC; Josh Thomas Chief Breaker & Partner at Atredis Partners; 3 Star; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography |
|
Formatted contents note |
SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC |
|
Formatted contents note |
Pentesting HardwareAnonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings; Hackers for Charity; Endnotes; Radio Frequency Identification (RFID); BitCoin and Digital Currency; Steganography; SSL Encryption; Advanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance |
|
Formatted contents note |
3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings |
650 #0 - |
Topical term or geographic name as entry element |
Computer crimes |
|
Topical term or geographic name as entry element |
Computer crimes |
|
Topical term or geographic name as entry element |
Hackers. |
|
Topical term or geographic name as entry element |
Computer networks |
|
Topical term or geographic name as entry element |
Computer security. |
|
Topical term or geographic name as entry element |
SOCIAL SCIENCE |
|
Topical term or geographic name as entry element |
Computer crimes. |
|
Topical term or geographic name as entry element |
Computer crimes |
|
Topical term or geographic name as entry element |
Computer networks |
|
Topical term or geographic name as entry element |
Computer security. |
|
Topical term or geographic name as entry element |
Hackers. |
700 1# - |
Personal name |
Sims, Kristin, |
Relator term |
author. |
|
Personal name |
Baskin, Brian, |
Relator term |
author. |
|
Personal name |
Martin, Brian, |
Relator term |
editor. |
856 40 - |
Uniform Resource Identifier |
http://www.sciencedirect.com/science/book/9780128042786 |
100 1# - MAIN ENTRY--PERSONAL NAME |
-- |
author. |
264 #1 - |
-- |
Waltham, MA : |
-- |
Syngress is an imprint of Elsevier, |
-- |
[2015] |
|
-- |
�2015 |
336 ## - |
-- |
text |
-- |
txt |
-- |
rdacontent |
337 ## - |
-- |
computer |
-- |
c |
-- |
rdamedia |
338 ## - |
-- |
online resource |
-- |
cr |
-- |
rdacarrier |
504 ## - |
-- |
Includes bibliographical references. |
588 0# - |
-- |
Online resource; title from PDF title page (EBSCO, viewed July 24, 2015). |
520 ## - |
-- |
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled ""The V3rb0t3n Network, "" continues the fic. |
650 #0 - |
-- |
Investigation. |
|
-- |
Case studies. |
|
-- |
Security measures. |
|
-- |
Criminology. |
-- |
bisacsh |
|
-- |
fast |
-- |
(OCoLC)fst00872063 |
|
-- |
Investigation. |
-- |
fast |
-- |
(OCoLC)fst00872065 |
|
-- |
Security measures. |
-- |
fast |
-- |
(OCoLC)fst00872341 |
|
-- |
fast |
-- |
(OCoLC)fst00872484 |
|
-- |
fast |
-- |
(OCoLC)fst00872150 |
655 #7 - |
-- |
Case studies. |
-- |
fast |
-- |
(OCoLC)fst01423765 |
|
-- |
Electronic books. |
|
-- |
Electronic books. |
|
-- |
Electronic books. |
-- |
lcgft |
776 08 - |
-- |
Print version: |
-- |
Street, Jayson E. |
-- |
Dissecting the Hack : The V3rb0t3n Network. |
-- |
Burlington : Elsevier Science, �2015 |
-- |
9780128042786 |
856 40 - |
-- |
ScienceDirect |