Qty:1
  • List Price: $54.95
  • Save: $7.81 (14%)
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Used: Like New | Details
Sold by Orion LLC
Condition: Used: Like New
Comment: Used, but looks brand new. Only very slight signs of use. Cover and binding are undamaged, and pages are crisp and unmarked. Unbeatable customer service, and we usually ship the same or next day. Over one million satisfied customers!
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Stealing the Network: How to Own a Continent Paperback – Illustrated, May 1, 2004

ISBN-13: 978-1931836050 ISBN-10: 1931836051 Edition: 1st

Buy New
Price: $47.14
34 New from $8.65 45 Used from $0.01 2 Collectible from $9.98
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$16.21
Paperback, Illustrated
"Please retry"
$47.14
$8.65 $0.01

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student




Frequently Bought Together

Stealing the Network: How to Own a Continent + Stealing the Network: How to Own the Box + Stealing the Network: How to Own an Identity
Price for all three: $122.36

Buy the selected items together

NO_CONTENT_IN_FEATURE
Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Series: Cyber-Fiction
  • Paperback: 432 pages
  • Publisher: Syngress; 1st edition (May 2004)
  • Language: English
  • ISBN-10: 1931836051
  • ISBN-13: 978-1931836050
  • Product Dimensions: 1 x 7 x 9.1 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (25 customer reviews)
  • Amazon Best Sellers Rank: #1,323,386 in Books (See Top 100 in Books)

Editorial Reviews

From the Publisher

The first Stealing book focused on the individual hacker. This book shows you what a group can do! ...what if you were part of a group, and didn't even know it? What if you made friends with someone on-line, and the two of you worked on a project together, not knowing the other person was using you to their aims? Now things get interesting!-From the foreword by Jeff Moss

He didn't notice the hooker asking him if he wanted a good time. He didn't notice the bum asking for 5 rand. He didn't notice the punk kid paying for one newspaper yet taking them all from the machine. His mind was ablaze with what he thought he would have to do, and probably wouldn't have noticed if he stepped on a rusty nail. Street. Cat. Door. Stairs. Up. He turned the key and opened the door to his apartment without losing his step. He didn't even realize that he closed the door without locking it. Backpack. Drop. Fridge. Beer. Spray in Eye. Shit. Screen. On. PGP. Mail. Scanning. There it was.

-----BEGIN PGP MESSAGE----- Version: PGP 8.0

Matthew copied the text, loaded PGP keys, and then grabbed the alternate keyring he needed. He ran PGPMail, and typed his passphrase. Even the e-mail hissed when he read it. "This is what must be done."

And featuring an inside look at the making of Stealing the Continent: this special appendix gives you access to the actual email threads of the STC authors, showing how the plot developed and how the authors and editors worked to build the book.

About the Author

Ryan Russell (aka Blue Boar) has worked in the IT field for over 13 years, focusing on information security for the last seven. He was the lead author of Hack Proofing Your Network, Second Edition (Syngress, ISBN: 1-928994-70-9), contributing author and technical editor of Stealing The Network: How to Own The Box (Syngress, ISBN: 1-931836-87-6), and is a frequent technical editor for the Hack Proofing series of books from Syngress. Ryan was also a technical advisor on Snort 2.0 Intrusion Detection (Syngress, ISBN: 1-931836-74-4). Ryan founded the vuln-dev mailing list, and moderated it for three years under the alias "Blue Boar." He is a frequent lecturer at security conferences, and can often be found participating in security mailing lists and website discussions. Ryan is the QA Manager at BigFix, Inc.

131ah is the technical director and a founding member of an IT security analysis company. After completing his degree in electronic engineering he worked for four years at a software engineering company specializing in encryption devices and firewalls. After numerous "typos" and "finger trouble," which led to the malignant growth of his personnel file, he started his own company along with some of the country's leaders in IT security.

Russ Rogers (CISSP, CISM, IAM) is a Co-Founder, Chief Executive Officer, Chief Technology Officer, and Principle Security Consultant for Security Horizon, Inc; a Colorado-based professional security services and training provider. Russ is a key contributor to Security Horizon's technology efforts and leads the technical security practice and the services business development efforts. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. Russ is also the editor-in-chief of 'The Security Journal' and occasional staff member for the Black Hat Briefings.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.7 out of 5 stars
5 star
18
4 star
6
3 star
1
2 star
0
1 star
0
See all 25 customer reviews
After reading this book, you will be better able to think like an attacker.
Jordan Grotepas
I read the first book in this series, and was both excited/skpetical when I saw their was a sequel coming out.
Ben Stevens
Much like STN, STC is a series of fictional episodes involving system attacks and exploits.
Thomas Duff

Most Helpful Customer Reviews

32 of 32 people found the following review helpful By Thomas Duff HALL OF FAMETOP 500 REVIEWERVINE VOICE on May 26, 2004
Format: Paperback
I recently read and reviewed Stealing The Network - How to Own the Box (STN) by Syngress Publishing. Great read. When I saw there was a follow-up titled Stealing The Network - How to Own a Continent (STC), I had to read it too. Once again, a great read for computer and security people.
Much like STN, STC is a series of fictional episodes involving system attacks and exploits. The episodes aren't real, but the techniques and concepts outlined are definitely true to life. The main difference between the two is that STC is a cohesive series of attacks coordinated by a mysterious person in the background who wants to disrupt a continent and make a huge financial score. So while each story in STN was a stand-alone chapter, STC is more like a mystery techno-thriller that is light on plot but heavy on technical detail.
In addition to learning about attacks and how they can occur (which you can get in just about any security book), STC once again adds the color of the attacker's personality into the equation... Why they do it, what they stand to gain, and what level of effort they are willing to expend to gain their prize. I feel that most security departments fall flat in this area. They can configure and set up proper security "by the book", but they are unable to think like a cracker and anticipate the unexpected. That's probably where this book (actually, both books) adds the most value to the collection of security knowledge and wisdom that's available on the technical bookshelves today.
If you're looking for a techno-thriller novel that reads like Tom Clancy, this isn't your book. But if you're looking for solid security information told in a colorful and unusual manner that will cause you to question your own security awareness, you found what you're looking for...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By Jake Rolston on June 25, 2004
Format: Paperback
I've read just about every "hacker" and security book worth reading over the past few years, and honestly, most of them really were not worth reading. But, this book is truly unique and is well worth your time to read. The security industry is incredibly complex; technically, socially, and ethically; and this book reflects that. There are many very talented (and WAY TOO MANY not so talented) people on the right, the wrong, and the in between of cyber security. The landscape of the internet changes almost every minute. This book manages to communicate the technical and social intracicies at the same time through a fairly compelling story that also encompasses very challenging, technical information. This really is a must read for anyone involved with the security community.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By roamer on May 27, 2004
Format: Paperback
I have read several books featuring Ryan Russell (Stealing the Network, Hackproofing Your Network, among others), Joe Grand (Stealing the Network, Hardware Hacking), and Russ Rogers (WarDriving: Drive Detect, Defend, Security Assessment: Case Studies for Implementing the NSA IAM) and have never been disappointed. This book was no exception. The story is presented in an easy to read style and the technical details are accurate and well presented.
I would recommend this book for anyone responsible for securing their networks, anyone interested in information security or vulnerability exploitation, and anyone who enjoys reading a good story. It's just a fun read.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Ben Stevens on June 15, 2004
Format: Paperback
I read the first book in this series, and was both excited/skpetical when I saw their was a sequel coming out. I am often disapointed with sequels to books or movies, because it often seems like the creators rush out something new to try and make some quick $$. This is one of the very rare ocassions where as much as I liked the first, I like the second even better. The authors of this edition have raised the bar by interconnecting a series of short stories into a single, intriguing narrative. What's really impressive is the they accomplish this while still teaching you about network security and vulnerabilities. The details of the hacks while far-fetched in places are technically accurate and incredibly timely. As much as I liked the stories and the hacks, my favorite part of the book is actually an appendix that transcribes a series of e-mail threads amongst the authors as they wrote the book. It's rather intersesting to see the likes of Fyodor, Kevin Mitnick, Tim Mullen, Jay Beale, etc. argue about the plot, joke around, etc. This book presents an intriguing look into the minds and tactics of criminal hackers and info. sec professionals.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Harold McFarland HALL OF FAMEVINE VOICE on October 12, 2004
Format: Paperback
Through a series of fictional system attacks and exploits Stealing the Network: How To Own a Continent provides a basic education in network security. More than just what can happen, it details each attack so you learn the purpose of the attack as well as how it is carried out. Each of the chapters provides the fictional account of an individual who takes on a single network attack. What the reader soon discovers is that it is actually a carefully orchestrated chain of attacks with a larger purpose in mind.

One of the things I really liked about the book is that it is not just a dry security book turned into a more interesting novel but it gives the reader a look at the personalities of those who get involved in these things. Each of the attacks involves real tools that can be downloaded or purchased off the Internet as well as real techniques. If you want to know how an attacker thinks and how far they will go to achieve their goals as well as some of the common techniques you can't go wrong with Stealing the Network: How to Own a Continent.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews

Search