Stealing the Network: How to Own an Identity and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $44.95
  • Save: $8.50 (19%)
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Stealing the Network: How... has been added to your Cart
FREE Shipping on orders over $35.
Used: Good | Details
Sold by HonourBooks
Condition: Used: Good
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Stealing the Network: How to Own an Identity Paperback – Illustrated, May 1, 2005

ISBN-13: 978-1597490061 ISBN-10: 1597490067 Edition: 1st

Buy New
Price: $36.45
27 New from $29.96 28 Used from $2.73 1 Collectible from $30.00
Amazon Price New from Used from
Kindle
"Please retry"
Paperback, Illustrated
"Please retry"
$36.45
$29.96 $2.73
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Frequently Bought Together

Stealing the Network: How to Own an Identity + Stealing the Network: How to Own the Box + Stealing the Network: How to Own a Continent
Price for all three: $123.68

Buy the selected items together

Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Stealing the Network (Book 3)
  • Paperback: 450 pages
  • Publisher: Syngress; 1 edition (May 1, 2005)
  • Language: English
  • ISBN-10: 1597490067
  • ISBN-13: 978-1597490061
  • Product Dimensions: 7.5 x 0.8 x 9.2 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #1,088,634 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.1 out of 5 stars
5 star
2
4 star
6
3 star
1
2 star
0
1 star
0
See all 9 customer reviews
Like I said, it's unlike anything I was ever expecting-in a good way.
ueberhund
I liked the two earlier books, and the third book -- Stealing the Network: How to 0wn an Identity (STNHT0AI) -- is also a fun read.
Richard Bejtlich
This book is a good read for people who are technical, but not information security experts.
Forrest Guest

Most Helpful Customer Reviews

9 of 9 people found the following review helpful By Christopher Byrne on August 21, 2005
Format: Paperback
If you have undertaken efforts to protect your identity from theft, have you thought to check on the credit reports of your children? I certainly had not, but this is one of the hidden gems/tips in the just published How To Own an Identity (Raven Adler, Jay Beale, et al, Syngress Press, 2005, 450 Pages, ISBN 1597490067), the third book in Syngress' Stealing the Network series.

While not the best book in the series (I believe the second book, How to Own A Continent, holds this distinction). But it is still a very good read, offering insights into how your identity is not only vulnerable to theft by individual hackers, but how these hackers may be just a pawn in larger attacks by organized crime and other groups. Like the first two books in the series, this book is presented as fiction laced with technical fact and education. The main characters are much the same, but you are given new insights and backstories about them.

You may think you know a lot about social engineering, but this art form takes on new meaning and perspective when you read Chapter 6, "The Java Script Cafe". In fact this chapter provides a good back drop that leads to revelations on how a hacker might turn the tables on the very people they were trying to serve. The book may also make you think twice about how much the government may not be on your side in protecting you identity, whether it be by siding with the companies that buy and sell your information in the marketplace, or even some unnamed agencies that you think are working for you.

It all makes for a very good read, but at the same time it does not flow together as well as the first two titles in the series. This may be a case of just too many authors contributing to one book, which is unfortunate.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By Giles on January 31, 2006
Format: Paperback
Good story, followed through pretty well from STN:Continent, which I haven't read in quite some time, so I didn't really do much cross-referencing, so take that comment for what it's worth. My two major issues with the book were:

1) Apparent lack of proofing whatsoever. In some cases it appeared that the author had stopped typing mid-sentence and picked up some time later, forgetting what exactly they had said because they had previously stopped typing mid-sentence. (re-read for example) At one point a whole paragraph was in there twice in a row. This sort of thing frazzled me a bit as I was reading it, and took away from the immersion to an extent. Each chapter was written by a different author so this is not a consitant trend through the entire book. There is some good writing in there as well.

2) More story, less technical stuff. This seemed a bit more 'novel-y' than the previous books, I kind of didn't like that aspect of it. That was just me though. Some of it was pretty good though, and a fun read, like the chapter about Knoll Jr. as well as the Blacktower chapter. All-in-all, I'd have to say that I liked the first STN [:box] the best, but that's just me. The cohesiveness of the story between chapters seemed to be better in this one [Identity] than STN:Continent, though.

Overall I give it three stars because I am a grammar nazi but you might enjoy it more. I recommend it if you've read the previous ones.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By Thomas Duff HALL OF FAMETOP 500 REVIEWERVINE VOICE on September 17, 2005
Format: Paperback
The latest installment in Syngress' Stealing series is Stealing The Network - How to Own an Identity by Timothy Mullen, Johnny Long, Raven Alder, Jay Beale, Riley Eller, Brian Hatch, Chris Hurley, Jeff Moss, Tom Parker, and Ryan Russell. The reason there are so many authors is that each chapter is written by a different person with an emphasis on the type of security issues they know best. The net effect ends up being an informative novel with hacking details woven in.

Since this is written in novel form, listing the table of contents wouldn't shed much light on what you're getting in the book. Suffice it to say that there is a lot of technical detail about particular hacks and social engineering attacks. The different writers cover various areas such as encryption and ciphers, hacking personal wi-fi networks to gain identity info, using credit card offers to help build alternate identities, and forensic examination of devices like fax machines and printers to gain knowledge of prior activity.

From a review perspective, I wasn't quite as engrossed in this book as I was with the prior installments. For one, this tries to pick up where Own a Continent leaves off. Many of the characters and incidents in this book got their beginning there. If you could read the two back-to-back, you might find better continuity. As it's been awhile since I read Continent, the story line wasn't as fresh to me as it could have been. Also, the basic storyline is rather vague and hard to follow. I kept thinking that the book was like a "certain type" of movie where the story line is only there to transition between the "action" scenes. While I'm not expecting NYT Top 10 Fiction material, I was hoping for something a little more cohesive.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By John Coale on October 12, 2005
Format: Paperback
Following in the tradition of the previous books of the "Stealing the Network" series and several other O'Reilly computer security books, this installment gives an interesting view of identity theft and how it can be used. The editors assembled a wide range of computer security talent to show the way identity theft can be abused for crime. This work of fiction is closer to truth than you'd wish possible. These sobering tales of computer exploits explains the motto "Control Information, Control Life."

It's a scary thought that this much information (and therefore power) is so easily available online.

The book makes an interesting point about how some people will be secure in protecting their personal information, but then post genealogy information online freely without realizing its value to crackers.

Learning to "know your enemy" in the computer realm requires a pirate's intuition, savvy? Chapter 2 is a neat scenario for creating and cracking codes. My wonder is where did all the money comes from and what was his father up to? Chapter 3 sounds frightfully easy to do - knowledge is power.

The stories are compelling and interesting, arousing both fear and intrigue. This shows how close fiction and real life can be. Parts of the book and the ending are somewhat hard to follow and I found the ending disappointing. Although you get the endgame of the story, it'd like to learn more about the lessons learned from such an experience. In thinking through all these activities, what can be learned for prevention of identity theft for our individual, business, and government responsibilities?

The book doesn't fully address the added possibilities of fraud, cyber stalking, information abuse, blackmail, and spamming that these cyber capabilities allow.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?