|
Showing 1 - 7 of
7 matches in All Departments
This is a book that will create enormous debate within the
technical and the counter-terrorism communities. While there will
be the inevitable criticism that the material contained in the book
could be used maliciously, the fact is that this knowledge is
already in the hands of our enemies. This book is truly designed to
inform while entertaining (and scaring) the reader, and it will
instantly be in demand by readers of "Stealing the Network: How to
Own the Box"
* A meticulously detailed and technically accurate work of fiction
that exposes the very real possibilities of such an event
occurring
* An informative and scary insight into the boundries of hacking
and cyber-terrorism
* Written by a team of the most accomplished cyber-security
specialists in the world
"Stealing the Network: How to Own the Box is a unique book in the
fiction department. It combines stories that are fictional with
technology that is real."
--Jeff Moss, Founder and CEO of Black Hat
The "Stealing the Network Series" has developed a passionate, cult
following which includes more than 30,000 readers. Over 3,000
readers have registered their copies of Stealing on the Syngress
Web site. The Stealing book signings at the Black Hat Briefings in
Las Vegas have become an annual event, attracting hundreds of
readers, who want to meet the authors who serve as the heroes and
villains of the series. These are true fans. They want the inside
scoop. They want their picture taken with the legend, Kevin
Mitnick. They want to know if the elaborate hacks in the stories
are actually based on real-life, close-encounters. They want to
know it all?.Did Jay Beale base his character on the movie "Real
Genius"?.....Does FX ever smile?...How tall is Thor?...Is ?Blah?
really Roelof Temmingh? Did the guys from Sensepost really receive
death threats in South Africa for ?revealing too much?. But maybe
most importantly?..they want to know: How does the story end?
"Stealing the Network: The Complete Series Collector's Edition,
Final Chapter, and DVD" answers all these questions and more. Not
only will longtime fans of the series find out how the story ends
in the much anticipated "Final Chapter" (The "Final Chapter" will
also be available separately as an E-Only product six months after
publication of the Collector's Edition). They will get much more
than this. The collector's edition also contains author-annotated
versions of the entire series: How to Own the Box, How to Own a
Continent, How to Own and Identity, and How to Own a Shadow. For
the first time, the authors will reveal which of the stories and
characters are actually based on fact. The authors will share
e-mails they exchanged during the writing of the books....and even
a few flames directed at one another! Fans of the series have
always been attracted to the "rock stars" of the hacking
underground who have contributed to the series over the years
including: Dan Kaminsky (Effugas), Fyodor, Tim Mullen (Thor),
Johnny Long, Ryan Russell (Blue Boar), Jay Beale, Joe Grand
(Kingpin), Jeff Moss, and Kevin Mitnick...just to name a few.
Friends and foes alike of the authors scour the internet for
information on the authors, and some some have even successfully
hacked into their computers and e-mail to find out more about them.
Now...they can find out everything they ever wanted to know without
risking federal prosecution in "Stealing the Network: The Complete
Series Collector's Edition, Final Chapter, and DVD,"
In addition to "The Final Chapter" and the "Annotated Complete
Series," the fanatics will also receive a DVD containing extended,
personal interviews with the primary authors and editors of the
series. The DVD also contains digital photographs from exclusive
and secretive author dinners and meetings at Black Hat and Defcon.
Long time fans of the series as well as a new generation of hackers
will be drawn to this unique collector's edition either for
themselves or as a gift for their favorite hacker.
* Annotated by the original authors, readers find out for the first
time which hacks and characters are real.
* The DVD contains exclusive, personal interviews with the rock
star authors shot atBlack Hat and Defcon.
* Readers will finally learn the fate of "Knuth" in the much
anticipated Final Chapter.
Leverage Puppet 5 for medium to large scale enterprise deployment.
Key Features Use and deploy Puppet 5, irrespective the size of your
organization Scaling, performance improvements, and managing
multiple developer requests Troubleshooting techniques, tips and
tricks to make the most of Puppet 5 Book DescriptionPuppet is a
configuration management system and a language written for and by
system administrators to manage a large number of systems
efficiently and prevent configuration drift. The core topics this
book addresses are Puppet's latest features and mastering Puppet
Enterprise. You will begin by writing a new Puppet module, gaining
an understanding of the guidelines and style of the Puppet
community. Following on from this, you will take advantage of the
roles and profiles pattern, and you will learn how to structure
your code. Next, you will learn how to extend Puppet and write
custom facts, functions, types, and providers in Ruby, and also use
the new features of Hiera 5. You will also learn how to configure
the new Code Manager component, and how to ensure code is
automatically deployed to (multiple) Puppet servers. Next, you will
learn how to integrate Puppet with Jenkins and Git to build an
effective workflow for multiple teams, and use the new Puppet Tasks
feature and the latest Puppet Orchestrator language extensions.
Finally, you will learn how to scale and troubleshoot Puppet. By
the end of the book, you will be able to deal with problems of
scale and exceptions in your code, automate workflows, and support
multiple developers working simultaneously. What you will learn
Solve problems using modules and the roles and profiles pattern
Extend Puppet with custom facts, functions, types, and providers
Use Hiera 5 and Code Manager/r10k to separate code from data
Continuously integrate your code using Jenkins, Git and automated
testing Use exported resources and the new Puppet Orchestration
features Explore Puppet Discovery features and their use
Troubleshoot various parts of the Puppet Enterprise infrastructure
Scale up and scale out Puppet infrastructure using various
techniques Who this book is forIf you are a system administrator or
developer who has used Puppet in production and are looking for
ways to easily use Puppet in an enterprise environment, this book
is for you. Some knowledge of writing simple configuration
management modules would be necessary.
The best-selling Stealing the Network series reaches its climactic
conclusion as law enforcement and organized crime form a high-tech
web in an attempt to bring down the shadowy hacker-villain known as
Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in
Syngress ground breaking, best-selling, Stealing the Network
series. As with previous title, How to Own a Shadow is a fictional
story that demonstrates accurate, highly detailed scenarios of
computer intrusions and counter-strikes. In How to Own a Thief,
Knuth, the master-mind, shadowy figure from previous books, is
tracked across the world and the Web by cyber adversaries with
skill to match his own. Readers will be amazed at how Knuth, Law
Enforcement, and Organized crime twist and torque everything from
game stations, printers and fax machines to service provider class
switches and routers steal, deceive, and obfuscate. From physical
security to open source information gathering, Stealing the
Network: How to Own a Shadow will entertain and educate the reader
on every page. The book s companion Web site will also provide
special, behind-the-scenes details and hacks for the reader to join
in the chase for Knuth.
. The final book in the Stealing the Network series will be a must
read for the 50,000 readers worldwide of the first three titles
. The companion Web site to the book will provide challenging
scenarios from the book to allow the reader to track down Knuth
. Law enforcement and security professionals will gain practical,
technical knowledge for apprehending the most supplicated
cyber-adversaries"
The first two books in this series "Stealing the Network: How to
Own the Box" and "Stealing the Network: How to Own a Continent"
have become classics in the Hacker and Infosec communities because
of their chillingly realistic depictions of criminal hacking
techniques.
In this third installment, the all-star cast of authors tackle one
of the fastest growing crimes in the world: Identity Theft. Now,
the criminal hackers readers have grown to both love and hate try
to cover their tracks and vanish into thin air... "Stealing the
Network: How to Own an Identity" is the 3rd book in the "Stealing"
series, and continues in the tradition created by its predecessors
by delivering real-world network attack methodologies and hacking
techniques within a context of unique and original fictional
accounts created by some of the world's leading security
professionals and computer technologists. The seminal works in
TechnoFiction, this "STN" collection yet again breaks new ground by
casting light upon the mechanics and methods used by those lurking
on the darker side of the Internet, engaging in the fastest growing
crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How
to Own a Continent" find themselves on the run, fleeing from both
authority and adversary, now using their technical prowess in a way
they never expected--to survive.
* The first two books in the series were best-sellers and have
established a cult following within the Hacker and Infosec
communities
* Identity theft is the fastest growing crime in the world, and
financial loss from identity theft is expected to reach $2 trillion
by the end of 2005
* All of the authors on thebook are world renowned, highly visible
information security experts who present at all of the top security
conferences including Black Hat, DefCon, and RSA and write for the
most popular magazines and Web sites including Information Security
Magazine, and SecurityFocus.com. All of these outlets will be used
to promote the book
|
You may like...
The Northman
Alexander Skarsgard, Nicole Kidman, …
Blu-ray disc
(1)
R210
Discovery Miles 2 100
|