- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
This item may be
Check for Availability
Hacking a Terror Network: The Silent Threat of Covert Channelsby Russ Rogers
Synopses & Reviews
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic insider's look into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to hack along with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.
Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.
Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
Accompanying CD-ROM allows users to hack along with the fictional narrative within the book to decrypyt.
An American agent suspects terrorists are using the Internet to communicate and plan attacks against the United States, in a novel that provides a computer disc that allows readers to uncover clues and create hidden messages.
Russ is a co-founder, CEO, CTO and Principal Security Consultant for Security Horizon, Inc. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. Russ is also the editor-in-chief of "The Security Journal." He also serves as the Professor of Network Security at the University of Advancing Technology (uat.edu) in Tempe, AZ. Russ is the author of Hacking a Terror Network: The Silent Threat of Covert Channels (Syngress, ISBN 1-928994-98-9). He has contributed to many books including Stealing the Network: How to Own a Continent (Syngress,
Table of Contents
Introduction to firewalls and the world of NetScreen: Dissecting the NetScreen firewall: Deploying NetScreen firewalls: Policy configuration: Routing: User authentication: Advanced policy configuration: NAT: Transparent mode: Attack detection and defense: VPN theory: VPN usage: Virtual systems: High availability: Troubleshooting the NetScreen firewall: Enterprise NetScreen management.
What Our Readers Are Saying
Computers and Internet » Computers Reference » General