Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mezonic Agenda: Hacking the Presidency

Buy
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will determine if the software will be implemented for use during the 2004 United States Presidential Elections. After his speech at an RSA conference in Amsterdam, he is handed a cryptic CD with information on the software from notorious hacker, Baff Lexicon. Unbeknownst to Davis, Advice Software has been tracking his every move since the inception of their software evaluation. A string of murders including Baff and the CFO of the Mezonic Corporation (a video card manufacturer in Macau, China) intensifies Davis' need to crack the CD and figure out its secrets before his testimony. He and his friend form the FBI must use their knowledge of buffer overflows, format string vulnerabilities and zero-day exploits to penetrate physical and cyber defenses, ultimately uncovering Advice's plot to fix the US presidential elections. Advice Software's CEO takes the game one step further by holding Davis' family as leverage for his testimony. What is the software's secret? Will Davis find out before his testimony? What are the motives that drive Advice Software's CEO and what is his connection to a secret society destined to avenge the 9/11 attacks against the US?

About the Author
Dr. Herbert H. Thompson is an internationally renowned speaker and expert on software security. He is the co-author of the first book on software security testing, "How to Break Software Security" (Addison Wesley 2003) ISBN: 0321194330. In addition, he writes frequently for magazines like Dr. Dobbs, ACM Queue, IEEE S&P and many others and frequently speaks and gives keynotes at conferences like RSA, Gartner, and SD Expo. Herbert holds a Ph.D. in applied mathematics but has worked in the area of computer security his entire career. He is currently Director of Security Technology for Security Innovation where he leads teams of security penetration testers on contracts from the U.S. Department of Defense. He is also Principal Investigator on many U.S. DoD grants to find new techniques to penetrate software.

Spyros Nomikos holds a BS and MS in Chemical Engineering from the Florida Institute of Technology. He has worked for numerous fuel cell companies developing future hydrogen systems. His expertise is in systems design, safety analysis, and new product development. He is published and has presented in numerous conference on subjects ranging from hyperthermophillic bacteria to fuel cells and hydrogen.

(HTML tags aren't allowed.)

IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Mastering the SAP Business Information Warehouse
Mastering the SAP Business Information Warehouse
"This book is insightful and thought-provoking for even the most seasoned SAP BW individual."
–Richard M. Dunning, Chair, American SAP Users Group

Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP Business Information Warehouse (BW) and create useful applications...

Biology and Knowledge Revisited: From Neurogenesis to Psychogenesis (Jean Piaget Symposium Series)
Biology and Knowledge Revisited: From Neurogenesis to Psychogenesis (Jean Piaget Symposium Series)
Based on the Annual Symposium of the Jean Piaget Society, Biology and Knowledge Revisited focuses on the classic issue of the relationship between nature and nurture in cognitive and linguistic development, and their neurological substrates. Contributors trace the history of ideas concerning the relationship between evolution and...

Exploring Marketing Research
Exploring Marketing Research

EXPLORING MARKETING RESEARCH deals with the design, collection, analysis, and reporting of marketing research data relevant to a firm's current and future needs. The text focuses on students as managers, not practitioners, of marketing research. Students learn about traditional types of marketing research, such as designing...

Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Build a Game with UDK
Build a Game with UDK

Many of the most popular games are built using toolkits comparable to UDK. Unreal Development Kit tools can help anyone take the ideas in their head and make them into a fully realized, playable world.

Build a Game with UDK is an introduction to the tools of the kit. From knowing about them, to creating virtual worlds, this book...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy