Foreword Chapter 1 Hide and Sneak—Ido Dubrawsky Chapter 2 The Worm Turns Chapter 3 Just Another Day at the Office Chapter 4 h3X’s Adventures in Networkland—FX Chapter 5 The Thief No One Saw Chapter 6 Flying the Friendly Skies Chapter 7 dis-card Chapter 8 Social (In)Security Chapter 9 BabelNet Chapter 10 The Art of Tracking Appendix The Laws of Security
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats" Gives readers a "first ever" look inside some of the most notorious network intrusions
This audience is comprised of engineers and administrators, who: 1.) Protect their network and storage data from theft and/or corruption. 2.) Ensure both Web-based and internal application and data availability to customers, business partners, and employees.
- No. of pages:
- © Syngress 2003
- 15th May 2003
- eBook ISBN:
- Paperback ISBN:
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are false, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else; it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the foreword by Jeff Moss, President & CEO, BlackHat, Inc. "...the reader will find this an informative, instructive and even entertaining book." - Managing Risk magazine