¥57,564¥57,564 税込
ポイント: 576pt
(1%)
配送料 ¥308 7月8日-21日にお届け
発送元: 大学書店ボストン -- University Bookstores Boston 販売者: 大学書店ボストン -- University Bookstores Boston
¥57,564¥57,564 税込
ポイント: 576pt
(1%)
配送料 ¥308 7月8日-21日にお届け
発送元: 大学書店ボストン -- University Bookstores Boston
販売者: 大学書店ボストン -- University Bookstores Boston
¥3,073¥3,073 税込
ポイント: 31pt
(1%)
配送料 ¥430 6月20日-30日にお届け
発送元: worldbooksjapan 販売者: worldbooksjapan
¥3,073¥3,073 税込
ポイント: 31pt
(1%)
配送料 ¥430 6月20日-30日にお届け
発送元: worldbooksjapan
販売者: worldbooksjapan
無料のKindleアプリをダウンロードして、スマートフォン、タブレット、またはコンピューターで今すぐKindle本を読むことができます。Kindleデバイスは必要ありません。
ウェブ版Kindleなら、お使いのブラウザですぐにお読みいただけます。
携帯電話のカメラを使用する - 以下のコードをスキャンし、Kindleアプリをダウンロードしてください。
Hacking a Terror Network: The Silent Threat of Covert Channels ペーパーバック – 2005/2/10
英語版
Russ Rogers
(著),
Matthew G Devost
(著)
{"desktop_buybox_group_1":[{"displayPrice":"¥57,564","priceAmount":57564.00,"currencySymbol":"¥","integerValue":"57,564","decimalSeparator":null,"fractionalValue":null,"symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"%2B2yTBseAXpvdSgpjVaMffzCSrkDZxl%2FksDuMebdyeXgRvhY7Rw0fS0PfTGQYnIqIN%2BH7hmpWwEacchiOrdNHN6IvOryKRTChhpPzD3ZP%2BamsrAWxXUgdrqNpDGxYJx567Bs2IL0IoZu2LrKyKq698tg3eFQ9QlZI6DJA7OJY0ri9tLt6FR6uIB4eDYDqS563","locale":"ja-JP","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"¥3,073","priceAmount":3073.00,"currencySymbol":"¥","integerValue":"3,073","decimalSeparator":null,"fractionalValue":null,"symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"%2B2yTBseAXpvdSgpjVaMffzCSrkDZxl%2FklSDUnNYApCQPjR%2FMhpQKt9odxtnMCDYqbqeeYPoFPmgXR94MZHfpCcPOgIE5je56QiCn8qaWQjPB3QbWib9t5j85881n7ra1zbQo7FOQNicbn%2BOutw0htfpzL64gv6eczL%2B1tYck2WXiQIF4ifzILQ%3D%3D","locale":"ja-JP","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}
購入オプションとあわせ買い
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
- 本の長さ448ページ
- 言語英語
- 出版社Syngress
- 発売日2005/2/10
- 寸法17.93 x 2.44 x 23.72 cm
- ISBN-101928994989
- ISBN-13978-1928994985
商品の説明
著者について
Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).
登録情報
- 出版社 : Syngress; 第1版 (2005/2/10)
- 発売日 : 2005/2/10
- 言語 : 英語
- ペーパーバック : 448ページ
- ISBN-10 : 1928994989
- ISBN-13 : 978-1928994985
- 寸法 : 17.93 x 2.44 x 23.72 cm
- カスタマーレビュー:
著者について
著者をフォローして、新作のアップデートや改善されたおすすめを入手してください。
著者の本をもっと発見したり、よく似た著者を見つけたり、著者のブログを読んだりしましょう
著者の本をもっと発見したり、よく似た著者を見つけたり、著者のブログを読んだりしましょう
カスタマーレビュー
星5つ中3.7つ
5つのうち3.7つ
全体的な星の数と星別のパーセンテージの内訳を計算するにあたり、単純平均は使用されていません。当システムでは、レビューがどの程度新しいか、レビュー担当者がAmazonで購入したかどうかなど、特定の要素をより重視しています。 詳細はこちら
6グローバルレーティング
虚偽のレビューは一切容認しません
私たちの目標は、すべてのレビューを信頼性の高い、有益なものにすることです。だからこそ、私たちはテクノロジーと人間の調査員の両方を活用して、お客様が偽のレビューを見る前にブロックしています。 詳細はこちら
コミュニティガイドラインに違反するAmazonアカウントはブロックされます。また、レビューを購入した出品者をブロックし、そのようなレビューを投稿した当事者に対して法的措置を取ります。 報告方法について学ぶ
他の国からのトップレビュー
Wilbur Wright
5つ星のうち5.0
Hacking 101
2015年7月22日にアメリカ合衆国でレビュー済みAmazonで購入
Good foundational source of how hacking works. From here you can understand the basics and caveats of the ever changing struggle to control data and communications. No matter what kind of security you have it can be penetrated. Unless you are Hilary Clinton of course. Nothing is safe and you must be constantly vigilant to protect and prevent being hacked. This will become more clear in the book.
MGD
5つ星のうち4.0
Accomplishes its objective
2005年2月13日にアメリカ合衆国でレビュー済みAmazonで購入
By way of full disclosure, I was the techincal editor on this book. I think Russ and I would be the first to admit it is far from perfect, but it does achieve its desired objective which is to educate readers on how terrorists might communicate using covert channels in a way that is generally accessible via a fictional narative.
I would take issue with W Boudville's claim of pretentiousness. He is missing the point on the emergence reference, as it is not intended to describe the cell's tactics (which were traditional), but rather the way they came together and engaged in action in support of a movement with no solid formal ties to the movement itself (in this instance, al Qaeda). No attempt at trendiness is intended, but I'll solidly stand by the reference.
If you are looking for a perfectly rounded novel with sophisticated character development and irrefutable plot components, you're likely to be unsatisfied with this book. If you want to learn about the technical topic at hand and be entertained at the same time, this book serves as an interesting and viable tool to do so.
I would take issue with W Boudville's claim of pretentiousness. He is missing the point on the emergence reference, as it is not intended to describe the cell's tactics (which were traditional), but rather the way they came together and engaged in action in support of a movement with no solid formal ties to the movement itself (in this instance, al Qaeda). No attempt at trendiness is intended, but I'll solidly stand by the reference.
If you are looking for a perfectly rounded novel with sophisticated character development and irrefutable plot components, you're likely to be unsatisfied with this book. If you want to learn about the technical topic at hand and be entertained at the same time, this book serves as an interesting and viable tool to do so.
Gary VanHaaften
5つ星のうち3.0
It read like a teenage novel
2015年8月25日にアメリカ合衆国でレビュー済みAmazonで購入
It read like a teenage novel. But it did go into explaining the hidden channels, which most likely saved the book.