AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, Joe Grand, Tim Mullen ISBN: 1-931836-87-6 Publisher: Syngress Pub. Date: 01 April, 2003 Format: Paperback Volumes: 1 List Price(USD): $49.95 |
Average Customer Rating: 4.44 (25 reviews)
Rating: 5
Summary: Making geeks exciting
Comment: This book is awesome! I read a lot of boring technical books, and this was one hell of a break from the extreme dullness. Eventhough this book is "fiction", it really illustrates some very real security threats out there in the digital noise of the Internet.
Especially cool is that each chapter is a new story with different hacking angles and spells out the actual tools and methods used (several chapters even had great real world references for the curious). This book's got a little bit of everything- hacking routers, OS's, social engineering, bypassing biometric physical security measures, scraping targeting information from the Internet, etc. Also, several of the stories are told from both the hacker's and security/system admin's point of view (white hat vs. black hat).
If you are bored with the average security books, then this one's for you. If only they were all this good...
Rating: 4
Summary: Syngress' answer to "Hacker's Challenge"
Comment: "Stealing the Network" (STN) is an entertaining and informative look at the weapons and tactics employed by those who attack and defend digital systems. STN is similar to the "Hacker's Challenge" books published by Osborne, although the stories are not separated into evidence and resolution sections. Rather, a collection of authors use mildly fictional tales to introduce readers to tactics and techniques used by black and white hat hackers.
My favorite chapter was written by FX of Phenoelit, where a female black hat battles white hat defenders. The playing field includes HP printers, GRE tunnels between routers, and other novel tricks. Reading both sides of the story was fun and educational. I also liked Joe "Kingpin" Grand's insider theft case (ch 3), featuring Palm hacks and Blackberry sniffing. The worm disassembly chapter by Ryan Russell and Tim Mullen is worth reading as well.
This book is worth reading, but it's $... cover price is steep. While the stories are fictional, much of it is probably based on the author's experiences either consulting or studying similar incidents. This book can best be used by security professionals to test how they would have responded to the threats presented by the fictional adversaries profiled in STN. There's plenty to be learned by reading STN, and I hope to see sequels.
Rating: 5
Summary: A peek into the mind of an attacker and defender...
Comment: Target Audience
Anyone with an interest in network security and wants to look into the mind of a network cracker/hacker.
Contents
This book is mostly a series of fictional stories written in first-person narrative on what happens during a network attack or an investigation into an attack.
The book is divided into the following chapters: Hide And Seek; The Worm Turns; Just Another Day At The Office; h3X's Adventures In Networkland; The Thief No One Saw; Flying The Friendly Skies; dis-card; Social (in)Security; BabelNet; The Art Of Tracking; The Laws Of Security
Review
All too often the topic of network security becomes an academic exercise, until it's too late. Companies might know what they should do, and they might even think they are beyond attack. But to a motivated person, your system may be nothing more than swiss cheese. Stealing The Network takes you beyond the technical and into the psychology of an attack.
Stealing The Network is a series of fictional stories about network attacks of various sorts. Hide And Seek is an attack on a company's network by a person upset with poor customer service. He steals a credit card file and posts it for others to use. The Worm Turns is an all-night hacking session to dissect the latest internet virus and post a patch before any of the other anti-virus firms do so. Just Another Day At The Office is a story of hacking for organized crime against a firm developing a new type of land mine, and involves both network and physical building intrusion. While it might be easy to dismiss these as the result of a vivid imagination, the reality is that all of these attacks are done on a daily basis. They may even have happened to you at your company, and you just don't know it yet.
The final chapter, The Laws Of Security, is a discussion of computer security and how you need to be thinking in order to secure your network. So it's not just a series of stories with no opportunities to learn what needs to be done. Also, each story is detailed with specific software and techniques used to accomplish the hack or the trackdown of the intruder. So as you're reading the story, you're actually picking up the necessary information you need in order to understand the network weakness and how to defend against it.
In my opinion, it's this blending of fictional reality that makes this book so valuable. I'd definitely recommend this to any security professional who is looking to understand the person behind the attacks.
Conclusion
An excellent read... Takes the subject of network security out of the academic and theoretical and places a face and attitude behind it all, while also teaching you the nuts and bolts of how attacks occur.
![]() |
Title: Snort 2.0 Intrusion Detection by Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth ISBN: 1931836744 Publisher: Syngress Pub. Date: February, 2003 List Price(USD): $49.95 |
![]() |
Title: The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak ISBN: 0471237124 Publisher: John Wiley & Sons Pub. Date: 04 October, 2002 List Price(USD): $27.50 |
![]() |
Title: Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed) by Stuart McClure, Joel Scambray, George Kurtz ISBN: 0072227427 Publisher: McGraw-Hill Osborne Media Pub. Date: 25 February, 2003 List Price(USD): $49.99 |
![]() |
Title: Hacker's Challenge 2: Test Your Network Security & Forensic Skills by Mike Schiffman, Bill Pennington, David Pollino, Adam J. O'Donnell ISBN: 0072226307 Publisher: McGraw-Hill Osborne Media Pub. Date: 18 December, 2002 List Price(USD): $39.99 |
![]() |
Title: Hacker Disassembling Uncovered by Kris Kaspersky, Natalia Tarkova, Julie Laing ISBN: 1931769222 Publisher: A-List Publishing Pub. Date: 01 April, 2003 List Price(USD): $39.95 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments