<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03248cam a2200325 a 4500</leader>
  <controlfield tag="001">1/45310</controlfield>
  <controlfield tag="008">140822s2003    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1932266682 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781932266689 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781931836876</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1931836876</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48270</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">N$T</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">N$T</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">OCLCG</subfield>
   <subfield code="d">CGN</subfield>
   <subfield code="d">ABI</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">TUU</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">TNF</subfield>
   <subfield code="d">EBLCP</subfield>
   <subfield code="d">NTG</subfield>
   <subfield code="d">BMU</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">ZCU</subfield>
   <subfield code="d">U5D</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">OCLCO</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Russell, Ryan,</subfield>
   <subfield code="d">1969-</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Stealing the network</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">how to own the box /</subfield>
   <subfield code="c">Ryan Russell ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Rockland, MA :</subfield>
   <subfield code="b">Syngress,</subfield>
   <subfield code="c">c2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxii, 303 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
   <subfield code="a">Cyber-Fiction Ser.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">&quot;Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one.&quot;--Foreword.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2="0">
   <subfield code="t">Hide and sneak /</subfield>
   <subfield code="r">Ido Dubrawsky --</subfield>
   <subfield code="t">The worm turns /</subfield>
   <subfield code="r">Ryan Russell and Tim Mullen --</subfield>
   <subfield code="t">Just another day at the office /</subfield>
   <subfield code="r">Joe Grand --</subfield>
   <subfield code="t">h3X's adventures in networkland /</subfield>
   <subfield code="r">FX --</subfield>
   <subfield code="g">The thief no one saw /</subfield>
   <subfield code="r">Paul Craig --</subfield>
   <subfield code="t">Flying the friendly skies /</subfield>
   <subfield code="r">Joe Grand --</subfield>
   <subfield code="t">dis-card /</subfield>
   <subfield code="r">Mark Burnett --</subfield>
   <subfield code="t">Social (In)Security /</subfield>
   <subfield code="r">Ken Pfeil --</subfield>
   <subfield code="t">BabelNet /</subfield>
   <subfield code="r">Dan Kaminsky --</subfield>
   <subfield code="t">The art of tracking /</subfield>
   <subfield code="r">Mark Burnett --</subfield>
   <subfield code="t">The laws of security /</subfield>
   <subfield code="r">Ryan Russell.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">License restrictions may limit access.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">&quot;Stealing the Network: How to Own the Box&quot; is NOT intended to be a &quot;install, configure, update, troubleshoot, and defend book.&quot; It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the &quot;street fighting&quot; tactics used to attack networks and systems. Not just another &quot;hacker&quot; book, it plays on &quot;edgy&quot; market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile &quot;White Hats&quot;, &quot;Black Hats&quot; and &quot;Gray Hats&quot; Gives readers a &quot;first ever&quot; look inside some of the most notorious network intrusions.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">&quot;Stealing the Network: how to open the box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real&quot;--P. xix.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="0">
   <subfield code="a">Short stories.</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
   <subfield code="a">Cyber-Fiction Ser.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140822</subfield>
   <subfield code="p">00b48270</subfield>
   <subfield code="q">00b48270</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781931836876</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48270_9781931836876.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48270_1931836876.jpg</subfield>
  </datafield>
 </record>
</collection>
