• List Price: CDN$ 71.25
  • You Save: CDN$ 9.04 (13%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Quantity:1
Stealing the Network: How... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Good | Details
Sold by Books Squared
Condition: Used: Good
Comment: Ships from the USA. Please allow 14-21 business days for delivery. Only lightly used. Book has minimal wear to cover and binding. A few pages may have small creases and minimal underlining. Book Selection as BIG as Texas.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Stealing the Network: How to Own a Continent Paperback – Nov 24 2010

5.0 out of 5 stars 9 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 62.21
CDN$ 54.60 CDN$ 3.46

Harry Potter and the Cursed Child
click to open popover


Frequently Bought Together

  • Stealing the Network: How to Own a Continent
  • +
  • Stealing The Network: How to Own the Box
Total price: CDN$ 106.53
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.




Product Details

  • Paperback: 498 pages
  • Publisher: Syngress; 1 edition (June 23 2004)
  • Language: English
  • ISBN-10: 1931836051
  • ISBN-13: 978-1931836050
  • Product Dimensions: 18 x 2.7 x 23.1 cm
  • Shipping Weight: 680 g
  • Average Customer Review: 5.0 out of 5 stars 9 customer reviews
  • Amazon Bestsellers Rank: #773,738 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Customer Reviews

5.0 out of 5 stars
5 star
9
4 star
0
3 star
0
2 star
0
1 star
0
See all 9 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I read the first book in this series, and was both excited/skpetical when I saw their was a sequel coming out. I am often disapointed with sequels to books or movies, because it often seems like the creators rush out something new to try and make some quick $$. This is one of the very rare ocassions where as much as I liked the first, I like the second even better. The authors of this edition have raised the bar by interconnecting a series of short stories into a single, intriguing narrative. What's really impressive is the they accomplish this while still teaching you about network security and vulnerabilities. The details of the hacks while far-fetched in places are technically accurate and incredibly timely. As much as I liked the stories and the hacks, my favorite part of the book is actually an appendix that transcribes a series of e-mail threads amongst the authors as they wrote the book. It's rather intersesting to see the likes of Fyodor, Kevin Mitnick, Tim Mullen, Jay Beale, etc. argue about the plot, joke around, etc. This book presents an intriguing look into the minds and tactics of criminal hackers and info. sec professionals.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I recently read and reviewed Stealing The Network - How to Own the Box (STN) by Syngress Publishing. Great read. When I saw there was a follow-up titled Stealing The Network - How to Own a Continent (STC), I had to read it too. Once again, a great read for computer and security people.
Much like STN, STC is a series of fictional episodes involving system attacks and exploits. The episodes aren't real, but the techniques and concepts outlined are definitely true to life. The main difference between the two is that STC is a cohesive series of attacks coordinated by a mysterious person in the background who wants to disrupt a continent and make a huge financial score. So while each story in STN was a stand-alone chapter, STC is more like a mystery techno-thriller that is light on plot but heavy on technical detail.
In addition to learning about attacks and how they can occur (which you can get in just about any security book), STC once again adds the color of the attacker's personality into the equation... Why they do it, what they stand to gain, and what level of effort they are willing to expend to gain their prize. I feel that most security departments fall flat in this area. They can configure and set up proper security "by the book", but they are unable to think like a cracker and anticipate the unexpected. That's probably where this book (actually, both books) adds the most value to the collection of security knowledge and wisdom that's available on the technical bookshelves today.
If you're looking for a techno-thriller novel that reads like Tom Clancy, this isn't your book. But if you're looking for solid security information told in a colorful and unusual manner that will cause you to question your own security awareness, you found what you're looking for...
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I've read just about every "hacker" and security book worth reading over the past few years, and honestly, most of them really were not worth reading. But, this book is truly unique and is well worth your time to read. The security industry is incredibly complex; technically, socially, and ethically; and this book reflects that. There are many very talented (and WAY TOO MANY not so talented) people on the right, the wrong, and the in between of cyber security. The landscape of the internet changes almost every minute. This book manages to communicate the technical and social intracicies at the same time through a fairly compelling story that also encompasses very challenging, technical information. This really is a must read for anyone involved with the security community.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
This is an amazing book about hacking. This will open your eyes to the world of hacking in the same way 'Hacking Exposed' did when it first came out. But different than HE, this doesn't jut tell you the how it tells you the why, and accomplishes this through an interesting fictional story. Anyone in the infosec world will recognize the tools and techniques used throughout the book as completely real and accurate. In many cases the authors of the book are the creators of the tools themselves--like the chapter Fyodor wrote which uses Nmap. I enjoy reading security books, but it's become incresingly difficult to find truly unique, original material. This book certainly fits the bill.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse
Format: Paperback
I have read several books featuring Ryan Russell (Stealing the Network, Hackproofing Your Network, among others), Joe Grand (Stealing the Network, Hardware Hacking), and Russ Rogers (WarDriving: Drive Detect, Defend, Security Assessment: Case Studies for Implementing the NSA IAM) and have never been disappointed. This book was no exception. The story is presented in an easy to read style and the technical details are accurate and well presented.
I would recommend this book for anyone responsible for securing their networks, anyone interested in information security or vulnerability exploitation, and anyone who enjoys reading a good story. It's just a fun read.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again.
Report abuse


Feedback