<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02740cam a2200337 a 4500</leader>
  <controlfield tag="001">1/45308</controlfield>
  <controlfield tag="008">140822s2004    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781931836050</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1931836051</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48268</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OCLCG</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Stealing the network</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">how to own a continent /</subfield>
   <subfield code="c">131ah ... [et al.] ; Ryan Russell, technical editor ; Kevin D. Mitnick, technical reviewer.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Rockland, Mass. :</subfield>
   <subfield code="b">Syngress ;</subfield>
   <subfield code="a">[Sebastopol, Calif.] :</subfield>
   <subfield code="b">Distributed by O'Reilly &amp; Associates in the United States and Canada,</subfield>
   <subfield code="c">2004.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (402 p.) :</subfield>
   <subfield code="b">ill., ports.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of &quot;Stealing the Network: How to Own the Box&quot; * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">&quot;Foreword by Jeff Moss, President &amp; CEO, Black hat, Inc&quot;--Cover.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Written by today's leading security and counter-terriorism experts, this sequel to &quot;Stealing the Network: How to Own the Box&quot; operates on a truly global stage when the network infrastructure of an entire continent is compromised.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2="0">
   <subfield code="t">Control yourself /</subfield>
   <subfield code="r">Ryan Russell --</subfield>
   <subfield code="t">The lagos creeper /</subfield>
   <subfield code="r">131ah --</subfield>
   <subfield code="t">Product of fate: the evolution of a hacker /</subfield>
   <subfield code="r">Russ Rogers --</subfield>
   <subfield code="t">A real gullible genius /</subfield>
   <subfield code="r">Jay Beale --</subfield>
   <subfield code="g">For whom Ma Bell tolls /</subfield>
   <subfield code="r">Joe Grand --</subfield>
   <subfield code="t">Return on investment /</subfield>
   <subfield code="r">Fyodor --</subfield>
   <subfield code="t">h3X and the big picture /</subfield>
   <subfield code="r">FX --</subfield>
   <subfield code="t">The story of Dex /</subfield>
   <subfield code="r">Paul Craig --</subfield>
   <subfield code="t">Automatic terror machine /</subfield>
   <subfield code="r">Tim Mullen --</subfield>
   <subfield code="t">Get out quick /</subfield>
   <subfield code="r">Ryan Russell.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer hackers</subfield>
   <subfield code="v">Fiction.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security</subfield>
   <subfield code="v">Fiction.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Cyberterrorism</subfield>
   <subfield code="v">Fiction.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="0">
   <subfield code="a">Short stories.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Suspense fiction.</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2=" ">
   <subfield code="a">131ah.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Russell, Ryan,</subfield>
   <subfield code="d">1969-</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Moss, Jeff.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140822</subfield>
   <subfield code="p">00b48268</subfield>
   <subfield code="q">00b48268</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781931836050</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48268_9781931836050.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48268_1931836051.jpg</subfield>
  </datafield>
 </record>
</collection>
