• List Price: CDN$ 71.25
  • You Save: CDN$ 26.87 (38%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Stealing The Network: How... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Very Good | Details
Sold by wobcanada
Condition: Used: Very Good
Comment: The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Stealing The Network: How to Own the Box Paperback – Nov 27 2009

4.5 out of 5 stars 26 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 44.38
CDN$ 37.89 CDN$ 1.36

Harry Potter and the Cursed Child
click to open popover

Special Offers and Product Promotions

  • You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)

Frequently Bought Together

  • Stealing The Network: How to Own the Box
  • +
  • Stealing the Network: How to Own a Continent
Total price: CDN$ 113.25
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 448 pages
  • Publisher: Syngress; 1 edition (May 29 2003)
  • Language: English
  • ISBN-10: 1931836876
  • ISBN-13: 978-1931836876
  • Product Dimensions: 18.8 x 2.4 x 23.3 cm
  • Shipping Weight: 658 g
  • Average Customer Review: 4.5 out of 5 stars 26 customer reviews
  • Amazon Bestsellers Rank: #670,584 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Product Description


"...the reader will find this an informative, instructive and even entertaining book." - Managing Risk magazine

Customer Reviews

4.5 out of 5 stars
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
This book is good. REAL good. I didn't give it 5 stars because I've never given any book 5 stars but this came close.
Basically, it sets up several different exploits and walks you through them from a variety of viewpoints; both the hackers and their victims. The stories are a mixed bag of styles and voices but they are all interesting and in many cases enlightening.
My big question is...is this book legal? It seems to dance on the line of actually showing people how to perform these exploits/hacks. In several cases the authors seem to have gone out of their way to hide key elements that would make the chapters downright dangerous in the wrong hands. In a post 9-11 world I'm not sure how good an idea it is to present this info to the general public is but it's darn interesting to read.
I've seen a couple of the authors speak at some conferences and it was cool to get a chance to see them strut their stuff in such a different environment.
Highly recommended.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
Target Audience
Anyone with an interest in network security and wants to look into the mind of a network cracker/hacker.
This book is mostly a series of fictional stories written in first-person narrative on what happens during a network attack or an investigation into an attack.
The book is divided into the following chapters: Hide And Seek; The Worm Turns; Just Another Day At The Office; h3X's Adventures In Networkland; The Thief No One Saw; Flying The Friendly Skies; dis-card; Social (in)Security; BabelNet; The Art Of Tracking; The Laws Of Security
All too often the topic of network security becomes an academic exercise, until it's too late. Companies might know what they should do, and they might even think they are beyond attack. But to a motivated person, your system may be nothing more than swiss cheese. Stealing The Network takes you beyond the technical and into the psychology of an attack.
Stealing The Network is a series of fictional stories about network attacks of various sorts. Hide And Seek is an attack on a company's network by a person upset with poor customer service. He steals a credit card file and posts it for others to use. The Worm Turns is an all-night hacking session to dissect the latest internet virus and post a patch before any of the other anti-virus firms do so. Just Another Day At The Office is a story of hacking for organized crime against a firm developing a new type of land mine, and involves both network and physical building intrusion. While it might be easy to dismiss these as the result of a vivid imagination, the reality is that all of these attacks are done on a daily basis. They may even have happened to you at your company, and you just don't know it yet.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I saw this book on the shelves and started flipping through it. Next thing I know it was a half hour later and I was still sitting on the floor with the same book in my lap.
In particular I wanted to read the chapter about H3x's adventure in networkland, since it seemed the most intriguing. She's a sexy female hacker that hits nightclubs and has a neon social life - so already we know the story is fiction, right?
I noticed that the author of one of the chapters posted a review. I didn't pay attention to which chapter and don't have the book in front of me, but he states that all the methods used are possible. Well, you can't have a technical book without subjecting it to technical scrutiny. Here's where the meat of my review weighs in: H3x's adventures sometimes make no sense, and other times are technically wrong. Let me explain.
First she realizes the changes she made on the routers at a university were logged to a syslog server, so she hacks that to cover her tracks by taking out the network address she used. Nevermind that she configured the routers to point a GRE tunnel to her home network, and then set "0wn3d" (or something similar) as the interface desription. Isn't that like sneaking tiptoe through a house late at night with a blaring stereo on your shoulders? And what kind of pipe would be going into her home to be able to keep up with an ethernet connection on a campus network? At this point everything is still technically possible, although somewhat unbelievable. Still - this is fiction after all.
The administrators catch wind of this and do all the obligatory password and community string changes, tightening of security with access lists and pant-wetting.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
By A Customer on Sept. 8 2003
Format: Paperback
Not much scares me. I've seen a lot in my life. As a security engineer, this book scares. It makes me want to quit my day job and just go sell suntan lotion on the beach.
All of the things the reader is shown in the book can be defended. The problem lies in the resources available to the reader in trying to defend their crown jewels. Sure, there are plenty of free tools available to do nearly every job; but how much time do you have to set them all up, tune them, reconfigure and update as needed and review the output? I know we would need to up our IT security labor budget 1000% to cover all of this.
Chances are, this book is going to open your eyes to the way you think an intrusion may work. You may think that one vulnerability will be your downfall. With this book, the people who know will show you how a malicious hacker will slip through the cracks between you systems.
As an owner of dozens of IT security books, this is one that gets a space where I can easily access it and read it again and again.
Forget the Freddy vs. Jason battle; these people are showing you how the fight is being brought to your cube. Oh yeah, it's on!
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse

Most recent customer reviews