The Mezonic Agenda: Hacking the Presidency

The Mezonic Agenda: Hacking the Presidency
Author :
Publisher : Elsevier
Total Pages : 402
Release :
ISBN-10 : 9780080479408
ISBN-13 : 0080479405
Rating : 4/5 (405 Downloads)

Book Synopsis The Mezonic Agenda: Hacking the Presidency by : Herbert Thomson

Download or read book The Mezonic Agenda: Hacking the Presidency written by Herbert Thomson and published by Elsevier. This book was released on 2004-09-23 with total page 402 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book. * To be published in October 2004 when interest in the American Presidential election will be at its highest. * Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.


The Mezonic Agenda: Hacking the Presidency Related Books

The Mezonic Agenda: Hacking the Presidency
Language: en
Pages: 402
Authors: Herbert Thomson
Categories: Computers
Type: BOOK - Published: 2004-09-23 - Publisher: Elsevier

GET EBOOK

The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer ov
The Mezonic Agenda
Language: en
Pages: 368
Authors: Herbert H. Thompson
Categories: Political Science
Type: BOOK - Published: 2004 - Publisher: Syngress Media Incorporated

GET EBOOK

Computer security expert Chad Davis, after being given a cryptic CD from computer hacker Baff Lexicon, investigates claims that Advice Software is trying to fix
Programmer's Ultimate Security DeskRef
Language: en
Pages: 609
Authors: James C Foster
Categories: Computers
Type: BOOK - Published: 2004-11-20 - Publisher: Elsevier

GET EBOOK

The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as
Apple I Replica Creation
Language: en
Pages: 369
Authors: Tom Owad
Categories: Computers
Type: BOOK - Published: 2005-02-17 - Publisher: Elsevier

GET EBOOK

The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for
Nessus Network Auditing
Language: en
Pages: 545
Authors: Jay Beale
Categories: Computers
Type: BOOK - Published: 2004-10-14 - Publisher: Elsevier

GET EBOOK

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-