Hacking a Terror Network: The Silent Threat of Covert Channels (Enhanced Edition) Hacking a Terror Network: The Silent Threat of Covert Channels (Enhanced Edition)

Hacking a Terror Network: The Silent Threat of Covert Channels (Enhanced Edition‪)‬

    • $52.99
    • $52.99

Publisher Description

Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.

Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.

Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.

GENRE
Computing & Internet
RELEASED
2005
27 January
LANGUAGE
EN
English
LENGTH
448
Pages
PUBLISHER
Elsevier Science
SELLER
Elsevier Ltd.
SIZE
5.2
MB
Stealing the Network: How to Own an Identity Stealing the Network: How to Own an Identity
2005
Avogadro Corp: The Singularity is Closer than It Appears Avogadro Corp: The Singularity is Closer than It Appears
2011
The Mimic App The Mimic App
2015
Faust 2.0 (Mitchell and Morton, #1) Faust 2.0 (Mitchell and Morton, #1)
2013
Take the Fourth Take the Fourth
2011
Operation Archimedes Operation Archimedes
2011
Low Tech Hacking Low Tech Hacking
2011
The 17 Laws of Parenting The 17 Laws of Parenting
2020
The 17 Laws of Marriage The 17 Laws of Marriage
2020
The Hacker's Guide to OS X The Hacker's Guide to OS X
2012
Network Security Evaluation Using the NSA IEM (Enhanced Edition) Network Security Evaluation Using the NSA IEM (Enhanced Edition)
2005
OS X for Hackers at Heart OS X for Hackers at Heart
2005