Ebook348 pages6 hours
The Mezonic Agenda: Hacking the Presidency: Hack along with the heroes and villains as the American Presidency hangs in the balance of cyber-space...
Rating: 5 out of 5 stars
5/5
()
About this ebook
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.
* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book.
* To be published in October 2004 when interest in the American Presidential election will be at its highest.
* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book.
* To be published in October 2004 when interest in the American Presidential election will be at its highest.
* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
Related to The Mezonic Agenda
Related ebooks
The Mezonic Agenda: Hacking the Presidency: Hack along with the heroes and villains as the American Presidency hangs in the balance of cyber-space... Rating: 5 out of 5 stars5/5Managing and Securing a Cisco Structured Wireless-Aware Network Rating: 3 out of 5 stars3/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5OS X for Hackers at Heart Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsSecuring IM and P2P Applications for the Enterprise Rating: 0 out of 5 stars0 ratingsBlack Hat Physical Device Security: Exploiting Hardware and Software: Exploiting Hardware and Software Rating: 4 out of 5 stars4/5Cyber Adversary Characterization: Auditing the Hacker Mind Rating: 5 out of 5 stars5/5Inside the SPAM Cartel: By Spammer-X Rating: 2 out of 5 stars2/5Host Integrity Monitoring Using Osiris and Samhain Rating: 0 out of 5 stars0 ratingsCyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Phishing Exposed Rating: 2 out of 5 stars2/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5Hacking a Terror Network: The Silent Threat of Covert Channels: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Intrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Richard Thieme's Islands in the Clickstream: Reflections on Life in a Virtual World Rating: 0 out of 5 stars0 ratingsSecurity Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5How to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsBotnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Software Piracy Exposed Rating: 1 out of 5 stars1/5Zen and the Art of Information Security Rating: 0 out of 5 stars0 ratingsCryptography for Developers Rating: 3 out of 5 stars3/5Configuring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Windows to Linux Migration Toolkita: Your Windows to Linux Extreme Makeover Rating: 0 out of 5 stars0 ratingsDeploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratings
Computers For You
101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5
Reviews for The Mezonic Agenda
Rating: 5 out of 5 stars
5/5
1 rating1 review
- Rating: 5 out of 5 stars5/5A chameleon is not happy with his life. He doesn't like changing colors or eating flies. He goes to zoo and wishes he was all sorts of different animals such as an elephant, flamingo, deer, turtle, and many more other animals at the zoo! After wishing to change into so many different animals he became all mixed up and he couldn't eat when he was hungry. He transformed back into his original self and realized being himself is best of all. This can teach students that each child is unique in his/her very own way and can teach students that they should appreciate that they are different.
Book preview
The Mezonic Agenda - Herbert Thomson
Enjoying the preview?
Page 1 of 1