Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Page Copyright Page Dedication Preface Acknowledgements Chapter 1 - Hacking the Casinos for a Million Bucks
Research Developing the Hack Rewriting the Code Back to the Casinos — This Time to Play New Approach The New Attack Caught! Aftermath
Chapter 2 - When Terrorists Come Calling
Khalid the Terrorist Dangles Some Bait Target for Tonight: SIPRNET A Time for Worrying Comrade Gets Busted Investigating Khalid The Harkat ul-Mujahideen In the Aftermath of 9/11 The White House Break-in Aftermath Five Years Later How Great Is the Threat?
Chapter 3 - The Texas Prison Hack
Inside: Discovering Computers Federal Prisons Are Different William Gets the Keys to the Castle Online in Safety Solution Nearly Caught Close Call Growing Up Back in the Free World
Chapter 4 - Cops and Robbers
Phreaking Getting into Court Guests of the Hotel Opening a Door Guarding the Barricades Under Surveillance Closing In The Past Catches Up On the News Arrested An End to Good Luck Jail Phreaking Doing Time What They’re Doing Today
Chapter 5 - The Robin Hood Hacker
Rescue Roots Midnight Meetings MCI WorldCom Inside Microsoft A Hero but Not a Saint: The New York Times Hack The Unique Nature of Adrian’s Skills Easy Information These Days
Chapter 6 - The Wisdom and Folly of Penetration Testing
ONE COLD WINTER ONE ALARMING GAME INSIGHT COUNTERMEASURES THE BOTTOM LINE
Chapter 7 - Of Course Your Bank Is Secure–Right ?
IN FARAWAY ESTONIA THE LONG-DISTANCE BANK HACK INSIGHT COUNTERMEASURES THE BOTTOM LINE NOTES
Chapter 8 - Your Intellectual Property Isn’t Safe
THE TWO-YEAR HACK ROBERT, THE SPAMMER’S FRIEND ROBERT THE MAN SHARING: A CRACKER’S WORLD INSIGHT COUNTERMEASURES THE BOTTOM LINE NOTES
Chapter 9 - On the Continent
Somewhere in London Diving In Mapping the Network Identifying a Router The Second Day Looking at the Configuration of the 3COM Device The Third Day Some Thoughts about “Hackers’ Intuition” The Fourth Day Accessing the Company’s System Goal Achieved INSIGHT COUNTERMEASURES THE BOTTOM LINE
Chapter 10 - Social Engineers — How They Work and How to Stop Them
A SOCIAL ENGINEER AT WORK INSIGHT COUNTERMEASURES THE BOTTOM LINE NOTES
Chapter 11 - Short Takes
THE MISSING PAYCHECK COME TO HOLLYWOOD, YOU TEEN WIZARD HACKING A SOFT DRINK MACHINE CRIPPLING THE IRAQI ARMY IN DESERT STORM THE BILLION-DOLLAR GIFT CERTIFICATE THE TEXAS HOLD ’EM HACK THE TEENAGE PEDOPHILE CHASER . . . AND YOU DON’T EVEN HAVE TO BE A HACKER NOTES
INDEX
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion