TY - BOOK AU - Thompson,Herbert H. TI - Mezonic agenda: hacking the presidency T2 - Cyber-Fiction Ser SN - 9781931836838 AV - PS3620.T56 M49 2004eb U1 - 813/.6 22 PY - 2004/// CY - Rockford, MA PB - Syngress Pub. KW - Computers KW - Fiction KW - American fiction KW - FICTION KW - Suspense KW - bisacsh KW - fast KW - Litteratur KW - Engelsk, amerikansk litteratur KW - Andre fag (naturvidenskab og teknik) KW - Andre fag KW - Electronic books KW - Political fiction KW - Suspense fiction KW - gsafd KW - lcgft N1 - Includes bibliographical references (page 368); Cover; Contents; Preface; About the CD; About the Contest; Part One, The Mezonic Agenda: Hacking the Presidency; Prologue: Seattle, WA; Chapter 1: Seattle, WA; Chapter 2: Macau, China; Chapter 3: Amsterdam, the Netherlands; Chapter 4: Amsterdam, the Netherlands; Chapter 5: Amsterdam, the Netherlands; Chapter 6: Amsterdam, the Netherlands; Chapter 7: Amsterdam, the Netherlands; Chapter 8: Amsterdam, the Netherlands; Chapter 9: Amsterdam, the Netherlands; Chapter 10: Amsterdam, the Netherlands; Chapter 11: Seattle, Washington; Chapter 12: Amsterdam, the Netherlands N2 - The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real. * The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book. * To be published in October 2004 when interest in the American Presidential election will be at its highest. * Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=118533 ER -