Stealing the Network: How to Own a Continent Paperback – Nov 24 2010
|New from||Used from|
Frequently Bought Together
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
Top Customer Reviews
Much like STN, STC is a series of fictional episodes involving system attacks and exploits. The episodes aren't real, but the techniques and concepts outlined are definitely true to life. The main difference between the two is that STC is a cohesive series of attacks coordinated by a mysterious person in the background who wants to disrupt a continent and make a huge financial score. So while each story in STN was a stand-alone chapter, STC is more like a mystery techno-thriller that is light on plot but heavy on technical detail.
In addition to learning about attacks and how they can occur (which you can get in just about any security book), STC once again adds the color of the attacker's personality into the equation... Why they do it, what they stand to gain, and what level of effort they are willing to expend to gain their prize. I feel that most security departments fall flat in this area. They can configure and set up proper security "by the book", but they are unable to think like a cracker and anticipate the unexpected. That's probably where this book (actually, both books) adds the most value to the collection of security knowledge and wisdom that's available on the technical bookshelves today.
If you're looking for a techno-thriller novel that reads like Tom Clancy, this isn't your book. But if you're looking for solid security information told in a colorful and unusual manner that will cause you to question your own security awareness, you found what you're looking for...
I would recommend this book for anyone responsible for securing their networks, anyone interested in information security or vulnerability exploitation, and anyone who enjoys reading a good story. It's just a fun read.
Most recent customer reviews
I really enjoyed working on this book and hope you'll enjoy reading it. We've tried to keep each chapter both fun and educational by trying to capture fairly realistically what... Read morePublished on June 27 2004
I am what is known in this trade as a 'nerd' and as a nerd I can only encourage others to get this book out. Read morePublished on May 27 2004 by Chris Poel
If Hunter Thompson wrote a computer book, this would be it. I didn't think it was possible to work sex, drugs, booze, strip-joints and bank fraud into a book about network... Read morePublished on May 26 2004 by Scott Schulman
Look for similar items by category
- Books > Computers & Technology > Certification Central
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > History & Culture > Security
- Books > Computers & Technology > Internet & Social Media > Hacking
- Books > Computers & Technology > Networking & Cloud Computing > Intranets & Extranets
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks
- Books > Computers & Technology > Programming