Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Stealing the Network: How to Own an Identity 1st Edition

4.1 out of 5 stars 10 customer reviews
ISBN-13: 978-1597490061
ISBN-10: 1597490067
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$4.83 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$36.00 On clicking this link, a new layer will be open
More Buying Choices
34 New from $12.99 39 Used from $0.59
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Best Books of the Year So Far
Looking for something great to read? Browse our editors' picks for the Best Books of the Year So Far in fiction, nonfiction, mysteries, children's books, and much more.
$36.00 FREE Shipping. Only 3 left in stock (more on the way). Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Stealing the Network: How to Own an Identity
  • +
  • Stealing the Network: How to Own the Box
  • +
  • Stealing the Network: How to Own a Continent
Total price: $127.76
Buy the selected items together

Editorial Reviews

About the Author

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
NO_CONTENT_IN_FEATURE

The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Series: Stealing the Network (Book 3)
  • Paperback: 450 pages
  • Publisher: Syngress; 1 edition (July 15, 2005)
  • Language: English
  • ISBN-10: 1597490067
  • ISBN-13: 978-1597490061
  • Product Dimensions: 7.1 x 1 x 8.9 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (10 customer reviews)
  • Amazon Best Sellers Rank: #799,782 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Christopher Byrne on August 21, 2005
Format: Paperback
If you have undertaken efforts to protect your identity from theft, have you thought to check on the credit reports of your children? I certainly had not, but this is one of the hidden gems/tips in the just published How To Own an Identity (Raven Adler, Jay Beale, et al, Syngress Press, 2005, 450 Pages, ISBN 1597490067), the third book in Syngress' Stealing the Network series.

While not the best book in the series (I believe the second book, How to Own A Continent, holds this distinction). But it is still a very good read, offering insights into how your identity is not only vulnerable to theft by individual hackers, but how these hackers may be just a pawn in larger attacks by organized crime and other groups. Like the first two books in the series, this book is presented as fiction laced with technical fact and education. The main characters are much the same, but you are given new insights and backstories about them.

You may think you know a lot about social engineering, but this art form takes on new meaning and perspective when you read Chapter 6, "The Java Script Cafe". In fact this chapter provides a good back drop that leads to revelations on how a hacker might turn the tables on the very people they were trying to serve. The book may also make you think twice about how much the government may not be on your side in protecting you identity, whether it be by siding with the companies that buy and sell your information in the marketplace, or even some unnamed agencies that you think are working for you.

It all makes for a very good read, but at the same time it does not flow together as well as the first two titles in the series. This may be a case of just too many authors contributing to one book, which is unfortunate.
Read more ›
1 Comment 9 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
The latest installment in Syngress' Stealing series is Stealing The Network - How to Own an Identity by Timothy Mullen, Johnny Long, Raven Alder, Jay Beale, Riley Eller, Brian Hatch, Chris Hurley, Jeff Moss, Tom Parker, and Ryan Russell. The reason there are so many authors is that each chapter is written by a different person with an emphasis on the type of security issues they know best. The net effect ends up being an informative novel with hacking details woven in.

Since this is written in novel form, listing the table of contents wouldn't shed much light on what you're getting in the book. Suffice it to say that there is a lot of technical detail about particular hacks and social engineering attacks. The different writers cover various areas such as encryption and ciphers, hacking personal wi-fi networks to gain identity info, using credit card offers to help build alternate identities, and forensic examination of devices like fax machines and printers to gain knowledge of prior activity.

From a review perspective, I wasn't quite as engrossed in this book as I was with the prior installments. For one, this tries to pick up where Own a Continent leaves off. Many of the characters and incidents in this book got their beginning there. If you could read the two back-to-back, you might find better continuity. As it's been awhile since I read Continent, the story line wasn't as fresh to me as it could have been. Also, the basic storyline is rather vague and hard to follow. I kept thinking that the book was like a "certain type" of movie where the story line is only there to transition between the "action" scenes. While I'm not expecting NYT Top 10 Fiction material, I was hoping for something a little more cohesive.
Read more ›
Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Good story, followed through pretty well from STN:Continent, which I haven't read in quite some time, so I didn't really do much cross-referencing, so take that comment for what it's worth. My two major issues with the book were:

1) Apparent lack of proofing whatsoever. In some cases it appeared that the author had stopped typing mid-sentence and picked up some time later, forgetting what exactly they had said because they had previously stopped typing mid-sentence. (re-read for example) At one point a whole paragraph was in there twice in a row. This sort of thing frazzled me a bit as I was reading it, and took away from the immersion to an extent. Each chapter was written by a different author so this is not a consitant trend through the entire book. There is some good writing in there as well.

2) More story, less technical stuff. This seemed a bit more 'novel-y' than the previous books, I kind of didn't like that aspect of it. That was just me though. Some of it was pretty good though, and a fun read, like the chapter about Knoll Jr. as well as the Blacktower chapter. All-in-all, I'd have to say that I liked the first STN [:box] the best, but that's just me. The cohesiveness of the story between chapters seemed to be better in this one [Identity] than STN:Continent, though.

Overall I give it three stars because I am a grammar nazi but you might enjoy it more. I recommend it if you've read the previous ones.
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Following in the tradition of the previous books of the "Stealing the Network" series and several other O'Reilly computer security books, this installment gives an interesting view of identity theft and how it can be used. The editors assembled a wide range of computer security talent to show the way identity theft can be abused for crime. This work of fiction is closer to truth than you'd wish possible. These sobering tales of computer exploits explains the motto "Control Information, Control Life."

It's a scary thought that this much information (and therefore power) is so easily available online.

The book makes an interesting point about how some people will be secure in protecting their personal information, but then post genealogy information online freely without realizing its value to crackers.

Learning to "know your enemy" in the computer realm requires a pirate's intuition, savvy? Chapter 2 is a neat scenario for creating and cracking codes. My wonder is where did all the money comes from and what was his father up to? Chapter 3 sounds frightfully easy to do - knowledge is power.

The stories are compelling and interesting, arousing both fear and intrigue. This shows how close fiction and real life can be. Parts of the book and the ending are somewhat hard to follow and I found the ending disappointing. Although you get the endgame of the story, it'd like to learn more about the lessons learned from such an experience. In thinking through all these activities, what can be learned for prevention of identity theft for our individual, business, and government responsibilities?

The book doesn't fully address the added possibilities of fraud, cyber stalking, information abuse, blackmail, and spamming that these cyber capabilities allow.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Stealing the Network: How to Own an Identity
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Stealing the Network: How to Own an Identity

Pages with Related Products. See and discover other items: ebay books, computer security