Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Stealing the Network: How to Own a Continent 1st Edition

4.5 out of 5 stars 30 customer reviews
ISBN-13: 978-1931836050
ISBN-10: 1931836051
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$17.92 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$49.45 On clicking this link, a new layer will be open
More Buying Choices
30 New from $13.94 49 Used from $1.79 1 Collectible from $15.00
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

$49.45 FREE Shipping. Only 6 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Stealing the Network: How to Own a Continent
  • +
  • Stealing the Network: How to Own the Box
  • +
  • Stealing the Network: How to Own an Identity
Total price: $133.63
Buy the selected items together

Editorial Reviews

From the Publisher

The first Stealing book focused on the individual hacker. This book shows you what a group can do! ...what if you were part of a group, and didn't even know it? What if you made friends with someone on-line, and the two of you worked on a project together, not knowing the other person was using you to their aims? Now things get interesting!-From the foreword by Jeff Moss

He didn't notice the hooker asking him if he wanted a good time. He didn't notice the bum asking for 5 rand. He didn't notice the punk kid paying for one newspaper yet taking them all from the machine. His mind was ablaze with what he thought he would have to do, and probably wouldn't have noticed if he stepped on a rusty nail. Street. Cat. Door. Stairs. Up. He turned the key and opened the door to his apartment without losing his step. He didn't even realize that he closed the door without locking it. Backpack. Drop. Fridge. Beer. Spray in Eye. Shit. Screen. On. PGP. Mail. Scanning. There it was.

-----BEGIN PGP MESSAGE----- Version: PGP 8.0

Matthew copied the text, loaded PGP keys, and then grabbed the alternate keyring he needed. He ran PGPMail, and typed his passphrase. Even the e-mail hissed when he read it. "This is what must be done."

And featuring an inside look at the making of Stealing the Continent: this special appendix gives you access to the actual email threads of the STC authors, showing how the plot developed and how the authors and editors worked to build the book.

About the Author

Ryan Russell (aka Blue Boar) has worked in the IT field for over 13 years, focusing on information security for the last seven. He was the lead author of Hack Proofing Your Network, Second Edition (Syngress, ISBN: 1-928994-70-9), contributing author and technical editor of Stealing The Network: How to Own The Box (Syngress, ISBN: 1-931836-87-6), and is a frequent technical editor for the Hack Proofing series of books from Syngress. Ryan was also a technical advisor on Snort 2.0 Intrusion Detection (Syngress, ISBN: 1-931836-74-4). Ryan founded the vuln-dev mailing list, and moderated it for three years under the alias "Blue Boar." He is a frequent lecturer at security conferences, and can often be found participating in security mailing lists and website discussions. Ryan is the QA Manager at BigFix, Inc.

131ah is the technical director and a founding member of an IT security analysis company. After completing his degree in electronic engineering he worked for four years at a software engineering company specializing in encryption devices and firewalls. After numerous "typos" and "finger trouble," which led to the malignant growth of his personnel file, he started his own company along with some of the country's leaders in IT security.

Russ Rogers (CISSP, CISM, IAM) is a Co-Founder, Chief Executive Officer, Chief Technology Officer, and Principle Security Consultant for Security Horizon, Inc; a Colorado-based professional security services and training provider. Russ is a key contributor to Security Horizon's technology efforts and leads the technical security practice and the services business development efforts. Russ is a United States Air Force Veteran and has served in military and contract support for the National Security Agency and the Defense Information Systems Agency. Russ is also the editor-in-chief of 'The Security Journal' and occasional staff member for the Black Hat Briefings.

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Series: Cyber-Fiction
  • Paperback: 432 pages
  • Publisher: Syngress; 1st edition (May 2004)
  • Language: English
  • ISBN-10: 1931836051
  • ISBN-13: 978-1931836050
  • Product Dimensions: 7.1 x 1.1 x 9.1 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (30 customer reviews)
  • Amazon Best Sellers Rank: #1,069,205 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Thomas Duff HALL OF FAMEVINE VOICE on May 26, 2004
Format: Paperback
I recently read and reviewed Stealing The Network - How to Own the Box (STN) by Syngress Publishing. Great read. When I saw there was a follow-up titled Stealing The Network - How to Own a Continent (STC), I had to read it too. Once again, a great read for computer and security people.
Much like STN, STC is a series of fictional episodes involving system attacks and exploits. The episodes aren't real, but the techniques and concepts outlined are definitely true to life. The main difference between the two is that STC is a cohesive series of attacks coordinated by a mysterious person in the background who wants to disrupt a continent and make a huge financial score. So while each story in STN was a stand-alone chapter, STC is more like a mystery techno-thriller that is light on plot but heavy on technical detail.
In addition to learning about attacks and how they can occur (which you can get in just about any security book), STC once again adds the color of the attacker's personality into the equation... Why they do it, what they stand to gain, and what level of effort they are willing to expend to gain their prize. I feel that most security departments fall flat in this area. They can configure and set up proper security "by the book", but they are unable to think like a cracker and anticipate the unexpected. That's probably where this book (actually, both books) adds the most value to the collection of security knowledge and wisdom that's available on the technical bookshelves today.
If you're looking for a techno-thriller novel that reads like Tom Clancy, this isn't your book. But if you're looking for solid security information told in a colorful and unusual manner that will cause you to question your own security awareness, you found what you're looking for...
Comment 33 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I've read just about every "hacker" and security book worth reading over the past few years, and honestly, most of them really were not worth reading. But, this book is truly unique and is well worth your time to read. The security industry is incredibly complex; technically, socially, and ethically; and this book reflects that. There are many very talented (and WAY TOO MANY not so talented) people on the right, the wrong, and the in between of cyber security. The landscape of the internet changes almost every minute. This book manages to communicate the technical and social intracicies at the same time through a fairly compelling story that also encompasses very challenging, technical information. This really is a must read for anyone involved with the security community.
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I have read several books featuring Ryan Russell (Stealing the Network, Hackproofing Your Network, among others), Joe Grand (Stealing the Network, Hardware Hacking), and Russ Rogers (WarDriving: Drive Detect, Defend, Security Assessment: Case Studies for Implementing the NSA IAM) and have never been disappointed. This book was no exception. The story is presented in an easy to read style and the technical details are accurate and well presented.
I would recommend this book for anyone responsible for securing their networks, anyone interested in information security or vulnerability exploitation, and anyone who enjoys reading a good story. It's just a fun read.
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I read the first book in this series, and was both excited/skpetical when I saw their was a sequel coming out. I am often disapointed with sequels to books or movies, because it often seems like the creators rush out something new to try and make some quick $$. This is one of the very rare ocassions where as much as I liked the first, I like the second even better. The authors of this edition have raised the bar by interconnecting a series of short stories into a single, intriguing narrative. What's really impressive is the they accomplish this while still teaching you about network security and vulnerabilities. The details of the hacks while far-fetched in places are technically accurate and incredibly timely. As much as I liked the stories and the hacks, my favorite part of the book is actually an appendix that transcribes a series of e-mail threads amongst the authors as they wrote the book. It's rather intersesting to see the likes of Fyodor, Kevin Mitnick, Tim Mullen, Jay Beale, etc. argue about the plot, joke around, etc. This book presents an intriguing look into the minds and tactics of criminal hackers and info. sec professionals.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Through a series of fictional system attacks and exploits Stealing the Network: How To Own a Continent provides a basic education in network security. More than just what can happen, it details each attack so you learn the purpose of the attack as well as how it is carried out. Each of the chapters provides the fictional account of an individual who takes on a single network attack. What the reader soon discovers is that it is actually a carefully orchestrated chain of attacks with a larger purpose in mind.

One of the things I really liked about the book is that it is not just a dry security book turned into a more interesting novel but it gives the reader a look at the personalities of those who get involved in these things. Each of the attacks involves real tools that can be downloaded or purchased off the Internet as well as real techniques. If you want to know how an attacker thinks and how far they will go to achieve their goals as well as some of the common techniques you can't go wrong with Stealing the Network: How to Own a Continent.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Stealing the Network: How to Own a Continent
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Stealing the Network: How to Own a Continent

Pages with Related Products. See and discover other items: computer security, computer network