Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
Date: 04 May 2011, 08:40

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " The Mezonic Agenda: Hacking the Presidency " from UseNet for FREE!
Product Description
There’s a vulnerability in the tabulation software used by the Federal Elections Committee, and millions of votes are about to be changed!
In six days Chad Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will determine if the software will be implemented for use during the 2004 United States Presidential Elections.
After his speech at an RSA conference in Amsterdam, he is handed a cryptic CD with information on the software from notorious hacker Baff Lexicon. Davis and his friend from the FBI must use their knowledge of buffer overflows, format string vulnerabilities and zero-day exploits to penetrate physical and cyber defenses, ultimately uncovering Advice's plot to fix the US presidential elections.
What is the software's secret? What are the motives that drive Advice Software's CEO and what is his connection to a secret society destined to avenge the 9/11 attacks against the US
Hack Along. You may win a trip to Las Vegas.
Want to get involved? Embedded in the plot of The Mezonic Agenda is a fully interactive game that tests your security and hacking skills. Decrypt the contents of the book and CD, then manipulate the mock election results to elect yourself President of The United States. Election will be held in early 2005.
What’s on the CD?
The CD contains just three files, but they literally hold the key to the election. One file simply reads:
"For the vision is yet for an appointed time, but at the end it shall speak, and not lie: though it tarry, wait for it; because it will surely come, it will not tarry."
Successful decryption reveals additional files and clues, bringing you ever-closer to hacking the Presidency.
About the Author
Dr. Herbert H. Thompson is an internationally renowned speaker and expert on software security. He is the co-author of the first book on software security testing, "How to Break Software Security" (Addison Wesley 2003) ISBN: 0321194330. In addition, he writes frequently for magazines like Dr. Dobbs, ACM Queue, IEEE S&P and many others and frequently speaks and gives keynotes at conferences like RSA, Gartner, and SD Expo. Herbert holds a Ph.D. in applied mathematics but has worked in the area of computer security his entire career. He is currently Director of Security Technology for Security Innovation where he leads teams of security penetration testers on contracts from the U.S. Department of Defense. He is also Principal Investigator on many U.S. DoD grants to find new techniques to penetrate software.
Spyros Nomikos holds a BS and MS in Chemical Engineering from the Florida Institute of Technology. He has worked for numerous fuel cell companies developing future hydrogen systems. His expertise is in systems design, safety analysis, and new product development. He is published and has presented in numerous conference on subjects ranging from hyperthermophillic bacteria to fuel cells and hydrogen.

DISCLAIMER:

This site does not store The Mezonic Agenda: Hacking the Presidency on its server. We only index and link to The Mezonic Agenda: Hacking the Presidency provided by other sites. Please contact the content providers to delete The Mezonic Agenda: Hacking the Presidency if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches