CUCKOO'S EGG

Author: Clifford Stoll

Publisher: Doubleday

ISBN: 0307819426

Category: True Crime

Page: 326

View: 8426

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Kuckucksei

Die Jagd auf die deutschen Hacker, die das Pentagon knackten

Author: Clifford Stoll

Publisher: S. Fischer Verlag

ISBN: 3105607242

Category: Fiction

Page: 454

View: 1057

›Kuckucksei‹ schildert bis ins Detail die hochdramatische Jagd nach deutschen Hackern, die in amerikanische Computernetze eingedrungen waren. Es ist der autobiografische Report eines amerikanischen Computercracks, der leidenschaftlich für die Sicherheit der Datennetze kämpft. (Dieser Text bezieht sich auf eine frühere Ausgabe.)

The Cuckoo's Egg

Tracking a Spy Through the Maze of Computer Espionage

Author: Clifford Stoll

Publisher: Singapore Books

ISBN: N.A

Category: Fiction

Page: 326

View: 3224

The first true account of computer espionage tells of a year-long single-handed hunt for a computer thief who sold information from American computer files to Soviet intelligence agents

Worm

Der erste digitale Weltkrieg

Author: Mark Bowden

Publisher: ebook Berlin Verlag

ISBN: 3827075203

Category: Science

Page: 288

View: 8562

Dass Cyberverbrechen und Cyberwar keine bloß virtuellen Gefahren mehr sind, sickert erst allmählich ins öffentliche und politische Bewusstsein. Als der Computerwurm »Conficker« im November 2008 auf die Welt losgelassen wurde, infizierte er binnen weniger Wochen Millionen von Computern weltweit. War er in ein System eingedrungen, konnte er dieses mit anderen verbinden und so ein Netzwerk bilden, das sich von außen kontrollieren ließ. Ein solch großes Botnetz ist theoretisch in der Lage, sämtliche Computernetzwerke zu überwältigen, ohne die heute unsere Banken, Telefone, Kraftwerke oder Flughäfen, ja sogar das Internet selbst kollabieren würden - mit unabsehbaren Folgen. War »Conficker« nur das Werkzeug von Cyberkriminellen oder gar eine reale militärische Waffe mit so nie dagewesenem Zerstörungspotenzial? Mark Bowden erzählt, wie in einem dramatischen Wettlauf Computerexperten alles daransetzen, den brandgefährlichen Wurm auszuschalten. Packend beschreibt er einen nach wie vor völlig unterschätzten Krieg, der buchstäblich unter unseren Fingerspitzen auf der Tastatur ausgefochten wird.

Inside Anonymous

Aus dem Innenleben des globalen Cyber-Aufstands

Author: Parmy Olson

Publisher: Redline Wirtschaft

ISBN: 3864142806

Category: Political Science

Page: 480

View: 1415

Erstmals packen die Hacker aus. Ende des Jahres 2010 nahmen weltweit Tausende an den digitalen Angriffen der Hackergruppe Anonymous auf die Webseiten von VISA, MasterCard und PayPal teil, um gegen die Sperrung der Konten von Wiki-Leaks zu protestieren. Splittergruppen von Anonymous infiltrierten die Netzwerke der totalitären Regime von Libyen und Tunesien. Eine Gruppe namens LulzSec schaffte es sogar, das FBI, die CIA und Sony zu attackieren, bevor sie sich wieder auflöste. Das Anonymous-Kollektiv wurde bekannt durch die charakteristische Guy-Fawkes-Maske, mit der sich die Aktivisten tarnen. Es steht für Spaß-Guerilla und politische Netzaktivisten ohne erkennbare Struktur, die mit Hacking-Attacken gegen die Scientology-Sekte und Internetzensur protestierten. Internetsicherheitsdienste und bald auch die gesamte Welt merkten schnell, dass Anonymous eine Bewegung war, die man sehr ernst nehmen sollte. Doch wer verbirgt sich eigentlich hinter den Masken? Inside Anonymous erzählt erstmalig die Geschichte dreier Mitglieder des harten Kerns: ihren Werdegang und ihre ganz persönliche Motivation, die sie zu überzeugten Hackern machte. Basierend auf vielen exklusiven Interviews bietet das Buch einen einzigartigen und spannenden Einblick in die Köpfe, die hinter der virtuellen Community stehen.

Die Atlantis-Offenbarung

Roman

Author: Thomas Greanias

Publisher: Heyne Verlag

ISBN: 3641061261

Category: Fiction

Page: 320

View: 6874

Der Archäologe Conrad Yates entdeckt in einem alten deutschen U-Boot Hinweise auf den verlorenen Kontinent Atlantis. Offenbar arbeiteten die Deutschen an einer Geheimwaffe, die ihrem Besitzer die Weltherrschaft ermöglichen würde. Die Bedrohung ist noch nicht gebannt – gemeinsam mit der Wissenschaftlerin Serena macht sich Conrad auf eine gefahrvolle Reise, die ihn über den Vatikan bis zum Tempelberg in Jerusalem führt.

Secrets & lies

IT-Sicherheit in einer vernetzten Welt

Author: Bruce Schneier

Publisher: N.A

ISBN: 9783898643023

Category:

Page: 408

View: 4869

Willkommen in der New Economy, der Welt der digitalen Wirtschaft. Informationen sind leichter zugänglich als je zuvor. Die Vernetzung wird dicher, und digitale Kommunikation ist aus den Unternehmen nicht mehr wegzudenken. Die Begeisterung für die Technologie hat jedoch Ihren Preis: Die Zahl der Sicherheitsrisiken nimmt ständig zu. Die neuen Gefahren, die mit dem E-Business verknüpft sind, müssen den Unternehmen weltweit aber erst klar werden. Dieses Buch ist ein erster Schritt in diese Richtung. Bruce Schneier, anerkannter Experte im Bereich Kryptographie, erklärt, was Unternehmen über IT-Sicherheit wissen müssen, um zu überleben und wettbewerbsfähig zu bleiben. Er deckt das gesamte System auf, von den Ursachen der Sicherheitslücken bis hin zu den Motiven, die hinter böswilligen Attacken stehen. Schneier zeigt Sicherheitstechnologien und deren Möglichkeiten, aber auch deren Grenzen auf. Fundiert und anschaulich zugleich behandelt dieser praktische Leitfaden: - Die digitalen Bedrohungen und Angriffe, die es zu kennen gilt - Die derzeit verfügbaren Sicherheitsprodukte und -prozesse - Die Technologien, die in den nächsten Jahren interessant werden könnten - Die Grenzen der Technik - Das Vorgehen, um Sicherheitsmängel an einem Produkt offenzulegen - Die Möglichkeiten, existierende Risiken in einem Unternehmen festzustellen - Die Implementierung einer wirksamen Sicherheitspolitik Schneiers Darstellung der digitalen Welt und unserer vernetzten Gesellschaft ist pragmatisch, interessant und humorvoll. Und sie ermöglicht es dem Leser, die vernetzte Welt zu verstehen und sich gegen ihre Bedrohungen zu wappnen. Hier finden Sie die Unterstützung eines Experten, die Sie für die Entscheidungsfindung im Bereich IT-Sicherheit brauchen.

Economic Espionage and Industrial Spying

Author: Hedieh Nasheri

Publisher: Cambridge University Press

ISBN: 9780521543712

Category: Law

Page: 270

View: 4185

This 2005 book provides an analytic overview and assessment of the changing nature of crime in the burgeoning information society. Bringing together views from leading national and international authorities, Hedieh Nasheri explains the historical and theoretical background surrounding issues of economic espionage, trade secret theft and industrial spying and its impact on society. She looks at legislative history, the progression of electronic and corporate criminal behavior by introducing the concept of information theft and computer crimes, exploring its definition, its identification and its development within criminology. Nasheri presents an assessment of the state of economic espionage activities within a criminological context and based on that assessment addresses areas where additional action is required. The book also draws attention to a variety of issues raised by economic espionage and technological development. It draws on a variety of disciplines, including criminology, criminal justice, sociology, law and society, economics and political science.

Understanding Intrusion Detection through Visualization

Author: Stefan Axelsson,David Sands

Publisher: Springer Science & Business Media

ISBN: 038727636X

Category: Computers

Page: 145

View: 6355

Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key shortfall in current intrusion detection systems is the high number of false alarms they produce. This book analyzes the false alarm problem, then applies results from the field of information visualization to the problem of intrusion detection. Four different visualization approaches are presented, mainly applied to data from web server access logs.

Everyday Computing in Academe

A Guide for Scholars, Researchers, Students, and Other Academic Users of Personal Computers

Author: Donald T. Mizokawa

Publisher: Educational Technology

ISBN: 9780877782766

Category: Computers

Page: 330

View: 6410

Der Turing Omnibus

Eine Reise durch die Informatik mit 66 Stationen

Author: A.K. Dewdney

Publisher: Springer-Verlag

ISBN: 3642788726

Category: Computers

Page: 496

View: 8208

Der Turing Omnibus macht in 66 exzellent geschriebenen Beiträgen Station bei den interessantesten Themen aus der Informatik, der Computertechnologie und ihren Anwendungen.

Rights and Responsibilities of Participants in Networked Communities

Author: Dorothy E. Denning,Herbert S. Lin

Publisher: National Academies

ISBN: N.A

Category: Language Arts & Disciplines

Page: 160

View: 3113

This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services, and grass-roots networks. The following questions were addressed in the workshop: (1) What policies, laws, regulations, or ethical standards apply to the use of networked services; who sets them; how are they developed; and how are they enforced? (2) What are users' expectations regarding privacy and protection of their proprietary rights? (3) What are the rights, responsibilities, and liabilities of providers or operators of networked services or of users of these services? and (4) What problems arise from connecting systems offering these services to systems that operate under different policies? The forum was organized around a set of hypothetical scenarios designed to illuminate how issues related to and associated with free speech, electronic vandalism, the protection of intellectual property interests, and privacy might emerge. The intent was to focus on the concerns that policymakers in government and the private sector might have, so much of the discussion involved questions of law and how the current legal regime helps to define the boundaries of what is or is not acceptable conduct on electronic networks. Background materials on technology, legal underpinnings, and the current policy environment are incorporated into chapters 1 through 3. Chapters 4 through 7 are devoted primarily to discussions of free speech, electronic vandalism, intellectual property interests, and privacy. Chapter 8 focuses on the deliberations of the steering committee. Five appendices provide information about network technology, the agendas for the workshop and forum, and biographies of the steering committee. (MAS)

Internet Denial of Service

Attack and Defense Mechanisms

Author: David Dittrich,Peter Reiher,Sven Dietrich

Publisher: Pearson Education

ISBN: 9780132704540

Category: Computers

Page: 400

View: 9118

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

Educom Review

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Computer networks

Page: N.A

View: 7380

Computing and communications in colleges and universities.

The Frugal CISO

Using Innovation and Smart Approaches to Maximize Your Security Posture

Author: Kerry Ann Anderson

Publisher: CRC Press

ISBN: 1482220083

Category: Business & Economics

Page: 381

View: 6884

If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today’s cost-cutting environment. The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology. The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise’s security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process. After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.

Cyber-Security and Threat Politics

US Efforts to Secure the Information Age

Author: Myriam Dunn Cavelty

Publisher: Routledge

ISBN: 1134086709

Category: Political Science

Page: 192

View: 7577

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

Visionäre der Programmierung

die Sprachen und ihre Schöpfer

Author: Federico Biancuzzi,Shane Warden

Publisher: O'Reilly Germany

ISBN: 3897219344

Category: Computer algorithms

Page: 485

View: 2336

In Visionare der Programmierung - Die Sprachen und ihre Schopfer werden exklusive Interviews mit den Entwicklern von historischen wie auch von hoch aktuellen Programmiersprachen veroffentlicht. In dieser einzigartigen Zusammenstellung erfahren Sie uber die Hintergrunde, die zu den spezifischen Design-Entscheidungen in den Programmiersprachen gefuhrt haben und uber die ursprungliche Ziele, die die Entwickler im Kopf hatten, als sie eine neue Programmiersprache entwarfen. Ebenso konnen Sie lesen, wieso Abweichungen zum ursprunglichen Design entstanden und welchen Einflu die jeweilige Sprache auf die heutige Softwareentwicklung noch besitzt. Adin D. Falkoff: APL Thomas E. Kurtz: BASIC Charles H. Moore: FORTH Robin Milner: ML Donald D. Chamberlin: SQL Alfred Aho, Peter Weinberger und Brian Kernighan: AWK Charles Geschke und John Warnock: PostScript Bjarne Stroustrup: C++ Bertrand Meyer: Eiffel Brad Cox und Tom Love: Objective-C Larry Wall: Perl Simon Peyton Jones, Paul Hudak, Philip Wadler und John Hughes: Haskell Guido van Rossum: Python Luiz Henrique de Figueiredo und Roberto Ierusalimschy: Lua James Gosling: Java Grady Booch, Ivar Jacobson und James Rumbaugh: UML Anders Hejlsberg: Delphi-Entwickler und fuhrender Entwickler von C#

Law and Popular Culture: Text, Notes, and Questions

Author: David Ray Papke,Christine A. Corcos,Melissa Cole Essig,Peter H. Huang,Lenora P. Ledwon,Diane H. Mazur,Carrie Menkel-Meadow,Philip N. Meyer

Publisher: LexisNexis

ISBN: 0327174358

Category: Law

Page: 560

View: 6033

The United States is the world's most legalistic nation not only because of its laws, lawyers, and courts but also due to the amount, variety, and appeal of its law-related popular culture. This large body of materials and experiences profoundly affects what Americans expect from their legal institutions and government. Indeed, might it be true that pop cultural law is more important in shaping the lay public's assumptions and expectations than are actual laws and real-life courtroom proceedings? Law and Popular Culture is the first classroom text to examine the full range of American law-related popular culture. Designed primarily for law school use, the text examines the most influential pop cultural media—film, radio, television, and inexpensive fiction—but each of the text's 14 chapters begins with a list of five readily available Hollywood films that are relevant to that particular chapter. Instructors might screen selections from these lists in conjunction with their courses. After an introduction to the study of popular culture and an outline of the text's goals, the chapters themselves fall into two categories. Half concern the pop cultural portrayals of legal institutions and actors—law schools, the legal profession, clients, witnesses, judges, and juries. The second half concern assorted areas of law—Constitutional Law, Criminal Law, and Torts from the first-year curriculum and Business Law, Family Law, International Law, and Military Law from standard upper-level electives. Instructors might use the text at the pace of one chapter per week for an entire semester or pick and expand upon selected chapters as they think best. Overall, Law and Popular Culture underscores and scrutinizes the immense role popular culture plays in shaping the American legal consciousness. Teachers and students alike can use the text to explore what Americans expect from their law and legal institutions while at the same time honing their understanding of law and of the meaning of justice under law.

Mafiaboy

A Portrait of the Hacker as a Young Man

Author: Michael Calce,Craig Silverman

Publisher: Rowman & Littlefield

ISBN: 0762768886

Category: True Crime

Page: 272

View: 593

In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was “Mafiaboy.” Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes—until now. Equal parts true-crime thriller and exposé, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking—from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.