The Mezonic Agenda, Hacking the Presidency
Herbert H. Thompson, Spiros Nomikos
Résumé
Millions of votes are about to be changed!
In six days Chad Davis will testify before Congress on the security, stability, and safety of Advice Software Inc's e-vote software. He is a world-renowned expert on software security, and his testimony will determine if the software will be implemented for use during the 2004 United States Presidential Elections.
After his speech at an RSA conference in Amsterdam, he is handed a cryptic CD with information on the software from notorious hacker Baff Lexicon. Davis and his friend from the FBI must use their knowledge of buffer overflows, format string vulnerabilities and zero-day exploits to penetrate physical and cyber defenses, ultimately uncovering Advice's plot to fix the US presidential elections.
Hack Along. You may win a free pass to Black Hat USA 2005. *
Want to get involved? Embedded in the plot of The Mezonic Agenda is a fully interactive game that tests your security and hacking skills. Decrypt the contents of the book and CD, then manipulate the mock election results to elect yourself President of The United States. Election will be held in early 2005.
What's on the CD?
The CD contains just three files, but they literally hold the key to the election. Successful decryption reveals more files, bringing you ever-closer to hacking the Presidency. The first clue simply reads:
"For the vision is yet for an appointed time, but at the end it shall speak, and not lie: though it tarry, wait for it; because it will surely come, it will not tarry."
L'auteur - Herbert H. Thompson
Dr. Herbert H. Thompson is an internationally renowned speaker and expert on software security. He is the co-author of the first book on software security testing, "How to Break Software Security" (Addison Wesley 2003) ISBN: 0321194330. In addition, he writes frequently for magazines like Dr. Dobbs, ACM Queue, IEEE S&P and many others and frequently speaks and gives keynotes at conferences like RSA, Gartner, and SD Expo. Herbert holds a Ph.D. in applied mathematics but has worked in the area of computer security his entire career. He is currently Director of Security Technology for Security Innovation where he leads teams of security penetration testers on contracts from the U.S. Department of Defense. He is also Principal Investigator on many U.S. DoD grants to find new techniques to penetrate software.
L'auteur - Spiros Nomikos
Spyros Nomikos holds a BS and MS in Chemical Engineering from the Florida Institute of Technology. He has worked for numerous fuel cell companies developing future hydrogen systems. His expertise is in systems design, safety analysis, and new product development. He is published and has presented in numerous conference on subjects ranging from hyperthermophillic bacteria to fuel cells and hydrogen.
Sommaire
- The Mezonic Agenda: Hacking the Presidency
- The Technology behind
- A Brief History of Voting : Origins to Modern Implementations
- Reverse Engineering
- Cryptography
- Buffer Overflows
- Steganography
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Herbert H. Thompson, Spiros Nomikos |
Parution | 08/11/2004 |
Nb. de pages | 368 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 668g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836838 |
ISBN13 | 978-1-931836-83-8 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Bureautique Réseaux Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet