CUCKOO'S EGG

Author: Clifford Stoll

Publisher: Doubleday

ISBN: 0307819426

Category: True Crime

Page: 326

View: 6679

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

The Cuckoo's Egg

Tracking a Spy Through the Maze of Computer Espionage

Author: Cliff Stoll

Publisher: Simon and Schuster

ISBN: 1416507787

Category: Biography & Autobiography

Page: 399

View: 3752

The first true account of computer espionage tells of a year-long single-handed hunt for a computer thief who sold information from American computer files to Soviet intelligence agents

High Tech Heretic

Reflections of a Computer Contrarian

Author: Clifford Stoll

Publisher: Anchor

ISBN: 0385489765

Category: Education

Page: 221

View: 3771

The author of Silicon Snake Oil offers a provocative and controversial critique of the educational applications and benefits of computers and provides a commonsense look at how technology can be best utilized and controlled in the modern world. Reprint. 35,000 first printing.

Silicon Snake Oil

Second Thoughts on the Information Highway

Author: Clifford Stoll

Publisher: Anchor

ISBN: 0385419945

Category: Computers

Page: 249

View: 3609

Offers a critical look at the hyperbole surrounding the Internet and the future uses of computer networks, and discusses the false assumptions concerning the true benefits of computers

Cyberpunk

Outlaws and Hackers on the Computer Frontier, Revised

Author: Katie Hafner,John Markoff

Publisher: Simon and Schuster

ISBN: 0684818620

Category: Science

Page: 396

View: 5661

Profiles computer hackers who overstep ethical boundaries and break the law to penetrate society's most sensitive computer networks.

Worm

The First Digital World War

Author: Mark Bowden

Publisher: Grove/Atlantic, Inc.

ISBN: 0802195121

Category: Political Science

Page: 288

View: 1306

From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world. The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became infected almost instantaneously. No one had ever seen anything like it. By January 2009, the worm lay hidden in at least eight million computers, and the botnet of linked computers it had created was big enough that an attack might crash the world. In this “masterpiece” (The Philadelphia Inquirer), Mark Bowden expertly lays out a spellbinding tale of how hackers, researchers, millionaire Internet entrepreneurs, and computer security experts found themselves drawn into a battle between those determined to exploit the Internet and those committed to protecting it.

Fatal System Error

The Hunt for the New Crime Lords Who are Bringing Down the Internet

Author: Joseph Menn

Publisher: ReadHowYouWant.com

ISBN: 1458716643

Category: Computer crimes

Page: 456

View: 5928

In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought-and why the Internet might not survive.

Takedown

The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It

Author: Tsutomo Shimomura,John Markoff

Publisher: Voice

ISBN: 9780786889136

Category: Social Science

Page: 336

View: 6205

The dramatic true story of the capture of the world's most wanted cyberthief by brilliant computer expert Tsutomu Shimomura, describes Kevin Mitnick's long computer crime spree, which involved millions of dollars in credit card numbers and corporate trade secrets. Reprint. NYT.

Kingpin

How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Author: Kevin Poulsen

Publisher: Broadway Books

ISBN: 0307588696

Category: Technology & Engineering

Page: 266

View: 8545

Documents how a troubled young computer hacker seized control of a massive international computer fraud network in 2006, tracing the efforts of FBI and Secret Service agents as well as an undercover operator to locate and arrest him. Reprint.

The Cuckoo's Egg

Tracking a Spy Through the Maze of Computer Espionage

Author: Clifford Stoll

Publisher: Singapore Books

ISBN: N.A

Category: Fiction

Page: 326

View: 6315

The first true account of computer espionage tells of a year-long single-handed hunt for a computer thief who sold information from American computer files to Soviet intelligence agents

The Art of Intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Author: Kevin D. Mitnick,William L. Simon

Publisher: John Wiley & Sons

ISBN: 9780470503829

Category: Computers

Page: 288

View: 5670

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Incident Response & Computer Forensics, Third Edition

Author: Jason Luttgens,Matthew Pepe,Kevin Mandia

Publisher: McGraw Hill Professional

ISBN: 0071798692

Category: Computers

Page: 544

View: 7902

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

Kingpin

The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network

Author: Kevin Poulsen

Publisher: Hachette UK

ISBN: 0733628389

Category: Biography & Autobiography

Page: 352

View: 3901

The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network. The word spread through the hacking underground like some unstoppable new virus: an audacious crook had staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The culprit was a brilliant programmer with a hippie ethic and a supervillain's double identity. Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses. Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

Crypto

How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

Author: Steven Levy

Publisher: Penguin

ISBN: 1101199466

Category: Computers

Page: 368

View: 832

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Ghost in the Wires

My Adventures as the World's Most Wanted Hacker

Author: Kevin Mitnick

Publisher: Little, Brown

ISBN: 0316134473

Category: Computers

Page: 432

View: 4031

The thrilling memoir of the world's most wanted computer hacker "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes--and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information.

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: Kevin Mitnick

Publisher: Little, Brown

ISBN: 0316380490

Category: Computers

Page: 320

View: 7296

Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.

Countdown to Zero Day

Stuxnet and the Launch of the World's First Digital Weapon

Author: Kim Zetter

Publisher: Crown

ISBN: 0770436188

Category: History

Page: 448

View: 3806

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Intrusion Detection & Prevention

Author: Endorf

Publisher: Tata McGraw-Hill Education

ISBN: 9780070616066

Category:

Page: N.A

View: 7527

Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Security Systems' Black ICE & RealSecure, Cisco Systems' Secure IDS, Computer Associates eTrust, Entercept, and the open source Snort tool.

Essentials of Programming Languages

Author: Daniel P. Friedman,Mitchell Wand

Publisher: MIT Press

ISBN: 0262062798

Category: Computers

Page: 410

View: 6537

1. Inductive sets of data 2. Data abstraction 3. Expressions 4. State 5. Continuation-passing interpreters 6. Continuation-passing style 7. Types 8. Modules 9. Objects and classes.

Building a Secure Computer System

Author: Morrie Gasser

Publisher: Van Nostrand Reinhold Company

ISBN: N.A

Category: Computers

Page: 288

View: 3909

Little prior knowledge is needed to use this long-needed reference. Computer professionals and software engineers will learn how to design secure operating systems, networks and applications.