Stealing The Network: How to Own the Box (Cyber-Fiction) and over one million other books are available for Amazon Kindle. Learn more
CDN$ 49.23
  • List Price: CDN$ 51.95
  • You Save: CDN$ 2.72 (5%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Add to Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Stealing The Network: How to Own the Box Paperback – May 15 2003


Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 49.23
CDN$ 36.59 CDN$ 1.27

Join Amazon Student in Canada



Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Product Details

  • Paperback: 448 pages
  • Publisher: Syngress; 1 edition (May 15 2003)
  • Language: English
  • ISBN-10: 1931836876
  • ISBN-13: 978-1931836876
  • Product Dimensions: 2.3 x 18.5 x 23 cm
  • Shipping Weight: 658 g
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (26 customer reviews)
  • Amazon Bestsellers Rank: #562,507 in Books (See Top 100 in Books)


Inside This Book (Learn More)
First Sentence
It wasn't that difficult. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt
Search inside this book:

Customer Reviews

4.5 out of 5 stars
5 star
16
4 star
8
3 star
0
2 star
2
1 star
0
See all 26 customer reviews
Share your thoughts with other customers

Most helpful customer reviews

Format: Paperback
Target Audience
Anyone with an interest in network security and wants to look into the mind of a network cracker/hacker.
Contents
This book is mostly a series of fictional stories written in first-person narrative on what happens during a network attack or an investigation into an attack.
The book is divided into the following chapters: Hide And Seek; The Worm Turns; Just Another Day At The Office; h3X's Adventures In Networkland; The Thief No One Saw; Flying The Friendly Skies; dis-card; Social (in)Security; BabelNet; The Art Of Tracking; The Laws Of Security
Review
All too often the topic of network security becomes an academic exercise, until it's too late. Companies might know what they should do, and they might even think they are beyond attack. But to a motivated person, your system may be nothing more than swiss cheese. Stealing The Network takes you beyond the technical and into the psychology of an attack.
Stealing The Network is a series of fictional stories about network attacks of various sorts. Hide And Seek is an attack on a company's network by a person upset with poor customer service. He steals a credit card file and posts it for others to use. The Worm Turns is an all-night hacking session to dissect the latest internet virus and post a patch before any of the other anti-virus firms do so. Just Another Day At The Office is a story of hacking for organized crime against a firm developing a new type of land mine, and involves both network and physical building intrusion. While it might be easy to dismiss these as the result of a vivid imagination, the reality is that all of these attacks are done on a daily basis. They may even have happened to you at your company, and you just don't know it yet.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By Mike Anderson on March 13 2004
Format: Paperback
Overall I enjoyed this book. I felt it was a good read and although some of the "hacks" were hard to beleive on a technical level. It did get me thinking. I was entertained throughout and I would recommend this book to other IT or security professionals.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
In some ways I though this would be a recipe book of hacks like most in this category. This book has great stories about hacks from the hackers point of view. It is a lot of fun following the thought process as the hack's progress. There is a technical side to the book, but its buried within the stories. I will go back through the book again and make notes of the different techniques used.
So if you're tired of seeing screen shots of a debugger doing hex dump for some nerd stealing or saving the world and want some realistic stories, this is the book to get.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By A Customer on March 7 2004
Format: Paperback
Well, this book *sounded* great. In fact, after taking a look at it I wondered if I'd received the correct item. For this price I'd expect more content. Instead, it's a bunch of stories. That's fine, and for maybe 15 bucks I'd buy it for airplane reading.
To be fair, it's advertised as supposedly fictional accounts. I guess I was just hoping that there was something meaty here. (Get it? Where's the beef? Hee hee.)
Spend your money on some of the classics instead, unless you're one of the few with disposable income.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
While this is not the best book for an introduction into the technical issues surrounding hacking, it is an entertaining approach to some of the issues. The book is not meant to be an instruction course for hacking but rather just some fun stories about hacking. No, the stories didn't actually happen, but most of them could, possibly with a little stretching. I like the book and I think it's a lot of fun to read.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By Todd Hudspeth on Nov. 13 2003
Format: Paperback
I was not very impressed with the publishing of this book. There were many typos and issues involving supposed screen prints that could not be adequately viewed.
The book was actually written as a novel and not actual incidents. With the number of true incidents occurring or that have occurred, using such incidents would have been much more useful.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
I saw this book on the shelves and started flipping through it. Next thing I know it was a half hour later and I was still sitting on the floor with the same book in my lap.
In particular I wanted to read the chapter about H3x's adventure in networkland, since it seemed the most intriguing. She's a sexy female hacker that hits nightclubs and has a neon social life - so already we know the story is fiction, right?
I noticed that the author of one of the chapters posted a review. I didn't pay attention to which chapter and don't have the book in front of me, but he states that all the methods used are possible. Well, you can't have a technical book without subjecting it to technical scrutiny. Here's where the meat of my review weighs in: H3x's adventures sometimes make no sense, and other times are technically wrong. Let me explain.
First she realizes the changes she made on the routers at a university were logged to a syslog server, so she hacks that to cover her tracks by taking out the network address she used. Nevermind that she configured the routers to point a GRE tunnel to her home network, and then set "0wn3d" (or something similar) as the interface desription. Isn't that like sneaking tiptoe through a house late at night with a blaring stereo on your shoulders? And what kind of pipe would be going into her home to be able to keep up with an ethernet connection on a campus network? At this point everything is still technically possible, although somewhat unbelievable. Still - this is fiction after all.
The administrators catch wind of this and do all the obligatory password and community string changes, tightening of security with access lists and pant-wetting.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Product Images from Customers

Search


Feedback