The Mezonic Agenda: Hacking the Presidency [With CDROM] by Spyros Nomikos

Page Updated:
Book Views: 65

Author
Spyros Nomikos
Publisher
Date of release
Pages
0
ISBN
9781931836838
Binding
Illustrations
Format
PDF, EPUB, MOBI, TXT, DOC
Rating
5
38

Advertising

Get eBOOK
The Mezonic Agenda: Hacking the Presidency [With CDROM]

Find and Download Book

Click one of share button to proceed download:
Choose server for download:
Download
Get It!
File size:2 mb
Estimated time:3 min
If not downloading or you getting an error:
  • Try another server.
  • Try to reload page — press F5 on keyboard.
  • Clear browser cache.
  • Clear browser cookies.
  • Try other browser.
  • If you still getting an error — please contact us and we will fix this error ASAP.
Sorry for inconvenience!
For authors or copyright holders
Amazon Affiliate

Go to Removal form

Leave a comment

Book review

The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.

* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book.

* To be published in October 2004 when interest in the American Presidential election will be at its highest.

* Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.


Readers reviews