Hacking a Terror Network: The Silent Threat of Covert Channels
By Russ Rogers and Matthew G Devost
5/5
()
About this ebook
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
Russ Rogers
Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).
Read more from Russ Rogers
OS X for Hackers at Heart Rating: 0 out of 5 stars0 ratingsLow Tech Hacking: Street Smarts for Security Professionals Rating: 4 out of 5 stars4/5The Hacker's Guide to OS X: Exploiting OS X from the Root Up Rating: 0 out of 5 stars0 ratingsWarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Rating: 0 out of 5 stars0 ratings
Related to Hacking a Terror Network
Related ebooks
AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Hack Proofing Your Network Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsWindows 2000 Active Directory Rating: 0 out of 5 stars0 ratingsHack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Syngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Google Talking Rating: 5 out of 5 stars5/5Seven Deadliest Wireless Technologies Attacks Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsMobile Malware Protection Third Edition Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsDisk encryption A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsMalware Sandbox A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsWeb Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Android (operating system) A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsCertified Cyber Forensics Professional The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsPro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms Rating: 0 out of 5 stars0 ratingsMalware Detection Second Edition Rating: 0 out of 5 stars0 ratingsHack Proofing Linux: A Guide to Open Source Security Rating: 5 out of 5 stars5/5Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks Rating: 0 out of 5 stars0 ratingsZero-Day Exploit: Countdown to Darkness Rating: 2 out of 5 stars2/5SOA Security Rating: 0 out of 5 stars0 ratingsAsterisk Hacking Rating: 0 out of 5 stars0 ratings
Security For You
Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5
Reviews for Hacking a Terror Network
1 rating0 reviews