He didn't notice the hooker asking him if he wanted a good time. He didn't notice the bum asking for 5 rand. He didn't notice the punk kid paying for one newspaper yet taking them all from the machine. His mind was ablaze with what he thought he would have to do, and probably wouldn't have noticed if he stepped on a rusty nail. Street. Cat. Door. Stairs. Up. He turned the key and opened the door to his apartment without losing his step. He didn't even realize that he closed the door without locking it. Backpack. Drop. Fridge. Beer. Spray in Eye. Shit. Screen. On. PGP. Mail. Scanning. There it was.
-----BEGIN PGP MESSAGE----- Version: PGP 8.0
Matthew copied the text, loaded PGP keys, and then grabbed the alternate keyring he needed. He ran PGPMail, and typed his passphrase. Even the e-mail hissed when he read it. "This is what must be done."
And featuring an inside look at the making of Stealing the Continent: this special appendix gives you access to the actual email threads of the STC authors, showing how the plot developed and how the authors and editors worked to build the book.
131ah is the technical director and a founding member of an IT security analysis company. After completing his degree in electronic engineering he worked for four years at a software engineering company specializing in encryption devices and firewalls. After numerous "typos" and "finger trouble," which led to the malignant growth of his personnel file, he started his own company along with some of the country's leaders in IT security.
Russ Rogers (CISSP, CISM, IAM) is a Co-Founder, Chief Executive Officer, Chief Technology Officer, and Principle Security Consultant for Security Horizon, Inc; a Colorado-based professional security services and training provider. Russ is a key contributor to Security Horizon's technology efforts and leads the technical security practice and the services business development efforts. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. Russ is also the editor-in-chief of 'The Security Journal' and occasional staff member for the Black Hat Briefings.
Using the Internet as most people do, without a knowledge of what is secure and what is not, I wanted to understand how wide is the phenomenon of stealing data electronically. Read morePublished 12 months ago by George Millior
I'd recommend this book to those who have some knowledge of hacking and now want to get a sense for how hacking is actually done in the real world. Read morePublished on March 17, 2012 by Jordan Grotepas
I first read this book when it came out, but now that I have the paperback edition, I can review it properly. I find this particular book the best of the whole series. Read morePublished on January 17, 2011 by manu ^^
I read a lot of technical books and also a lot of spy books. This mashed both of my favorite types of books. Read morePublished on July 31, 2006 by James E. Becher
but the writing certainly isn't the best. They're a bunch of computer geeks writing about what they know best, and they make it entertaining as heck. Read morePublished on October 26, 2005 by Karl Sickendick
Well, you can make a novel out of it.
Which is precisely what the folks at Syngress Publishing have done. Read more
Nice book, seemed with hacker's novel!!
Pretty good read for fun. :)
How to Own a Continent is the first Stealing the Network book I have read and although it kept me on the edge of my seat I was displeased with the ending. Read morePublished on July 19, 2005 by Seth Michael Thompson
What does any good book have to have to rivet a reader and not let them go? A good plot. Throw in the mob, strippers, assassinations, sex, money laundering, and conspiracy and what... Read morePublished on May 19, 2005 by Christopher Byrne