Ebook348 pages6 hours
The Mezonic Agenda: Hacking the Presidency: Hack along with the heroes and villains as the American Presidency hangs in the balance of cyber-space...
Rating: 5 out of 5 stars
5/5
()
About this ebook
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.
* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book.
* To be published in October 2004 when interest in the American Presidential election will be at its highest.
* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book.
* To be published in October 2004 when interest in the American Presidential election will be at its highest.
* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
Related to The Mezonic Agenda
Related ebooks
The Mezonic Agenda: Hacking the Presidency: Hack along with the heroes and villains as the American Presidency hangs in the balance of cyber-space... Rating: 5 out of 5 stars5/5Managing and Securing a Cisco Structured Wireless-Aware Network Rating: 3 out of 5 stars3/5Scene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5OS X for Hackers at Heart Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsSecuring IM and P2P Applications for the Enterprise Rating: 0 out of 5 stars0 ratingsBlack Hat Physical Device Security: Exploiting Hardware and Software: Exploiting Hardware and Software Rating: 4 out of 5 stars4/5Cyber Adversary Characterization: Auditing the Hacker Mind Rating: 5 out of 5 stars5/5Inside the SPAM Cartel: By Spammer-X Rating: 2 out of 5 stars2/5Host Integrity Monitoring Using Osiris and Samhain Rating: 0 out of 5 stars0 ratingsCyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Phishing Exposed Rating: 2 out of 5 stars2/5Hacking a Terror Network: The Silent Threat of Covert Channels: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Intrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Security Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5How to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsBotnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Software Piracy Exposed Rating: 1 out of 5 stars1/5Zen and the Art of Information Security Rating: 0 out of 5 stars0 ratingsCryptography for Developers Rating: 3 out of 5 stars3/5Configuring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Windows to Linux Migration Toolkita: Your Windows to Linux Extreme Makeover Rating: 0 out of 5 stars0 ratingsDeploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsThe Best Damn Firewall Book Period Rating: 5 out of 5 stars5/5How to Cheat at Designing Security for a Windows Server 2003 Network Rating: 3 out of 5 stars3/5
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsHow to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mindhacker: 60 Tips, Tricks, and Games to Take Your Mind to the Next Level Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsMaster Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5What Video Games Have to Teach Us About Learning and Literacy. Second Edition Rating: 4 out of 5 stars4/5
Reviews for The Mezonic Agenda
Rating: 5 out of 5 stars
5/5
1 rating1 review
- Rating: 5 out of 5 stars5/5A chameleon is not happy with his life. He doesn't like changing colors or eating flies. He goes to zoo and wishes he was all sorts of different animals such as an elephant, flamingo, deer, turtle, and many more other animals at the zoo! After wishing to change into so many different animals he became all mixed up and he couldn't eat when he was hungry. He transformed back into his original self and realized being himself is best of all. This can teach students that each child is unique in his/her very own way and can teach students that they should appreciate that they are different.
Book preview
The Mezonic Agenda - Herbert Thomson
\ book_preview_excerpt.html
Enjoying the preview?
Page 1 of 1