Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.
One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are false, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else; it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the foreword by Jeff Moss, President & CEO, BlackHat, Inc.
"...the reader will find this an informative, instructive and even entertaining book." - Managing Risk magazine
The spelling in this book is horrible, there are mistakes on nearly every other page. Really the person who proof read this book should be fired, it's that bad. Read morePublished 6 months ago by John Smith
This was an interesting read and very technical. The reason I did not like it is because their are many screen shots on the Kindle version(that I read on my iPad) and not a single... Read morePublished on December 29, 2012 by N0L0V3
its a pretty well written book. It is simple and easy to understand. I would read it for entertainment because the scenarios are really old.Published on June 28, 2011 by B. Wan
This is not a book that's going to prepare you for a test. Although it is recommended for the CEH. It's not a book that is going to teach you different techniques. Read morePublished on June 6, 2010 by Lawrence Patterson
This is a entertaining peek into the mindset of hackers. It's definitely not a "how-to" manual to exploiting a system, but it gives you a great overview of the steps involved. Read morePublished on September 7, 2008 by bookworm
While they present this as a work of fiction, there is a large amount of information that can be immediately applied to your own situations. Read morePublished on January 9, 2007 by M. Ulm
The Stealing the Network series of books is in a catagory on it's own. Thrilling, entertaining, and fun to read just scratches the surface of these books. Read morePublished on August 15, 2006 by Family_Guy