Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Stealing the Network: How to Own a Continent

Stealing the Network: How to Own a Continent

List Price: $49.95
Your Price: $32.97
Product Info Reviews

<< 1 2 >>

Rating: 4 stars
Summary: Plausible, informative, and disturbing -- a great read
Review: 'Stealing the Network: How to Own a Continent' (STN:HTOAC) is a detailed look at the capabilities a structured threat could apply to the world's vulnerable digital infrastructures. Rather than hire a Beltway Bandit, I recommend those planning the digital defense of this nation read HTOAC. This book is more creative, comprehensive, and plausible than what most 'infowar' think-tanks could produce.

HTOAC is second in the STN series, which is developing into an entertaining and effective way to train security professionals. I was a little worried that such a large team of authors would not be able to create a cohesive book. It's easier to assemble the series of vignettes in the original 'Stealing the Network: How to Own the Box' than it is to tie together stories by a dozen authors. While the editing is rough is some places, the storyline explained each individual's part in the caper fairly well. Although the end of the book hints at a certain conclusion, I would have enjoyed a more definitive epilogue, perhaps written from the law enforcement perspective.

The strength of HTOAC derives from the expertise of its authors. I've never seen anything in print quite like Joe Grand's chapter on switch hacking. Ryan Russell's description of Knuth's bunker buildout would put the Discovery Channel's 'Monster House' to shame. The attention paid to leveraging unauthorized physical and wireless attacks also seemed very realistic.

I have no major concerns with HTOAC, but I don't think it was necessary to print a log of emails exchanged during the book development process. The text held its own at 345 pages, so 50 pages of email add no real value. I also question the need for authors to write 5-star 'reviews' of their own books. Authors write books, and readers write reviews.

I look forward to the next book in the STN series. Syngress is doing an excellent job bringing nonstandard security topics to light by tapping niche talents. Everyone will look at their defensive posture differently after reading HTOAC; this is the authors' greatest gift to the security community.

Rating: 5 stars
Summary: A Real Hoot, Way Better than Spy Stories--Be Afraid...
Review:


I picked this book up at Hackers on Planet Earth, and got Kevin Mitnick to sign a poster at the same time. The book is a hoot. I've done the spy stuff, it's boring compared to the persistent intelligence shown by these cyber-spooks, a couple of whom I am pleased to know.

I suppose the disclaimer is necessary: this is a novel, for educational and entertainment purposes only. If you want to be cyber-spy, this book strikes me as a great way to start getting hooked. If you are a security manager, be afraid, very afraid...you need to read this book.

Rating: 5 stars
Summary: Well worth the time.
Review: A great read and well worth the time. This should be a required book for all those who want to be involved in or know more about Information Security as it will definitely get you thinking about how you use your computer when connected to any network.

Though the stories are "fictional," the tools and techniques are very real. I've personally referred to a couple of the scenarios to get my employer's attention. Thanks to the authors for sharing their "work" - sorry, I mean, "stories."

Rating: 5 stars
Summary: Super!
Review: I am what is known in this trade as a 'nerd' and as a nerd I can only encourage others to get this book out. If - like me - you're 6ft 8" and so are physically unable to manipulate yourself into a low enough posture so as to watch a 'headrest TV' screen during longhaul flights then you've probably read all the old IT fiction books of any interest. This is the next one for you.
The best part about this sequel is how it follows so seemlessly from the first; which was wrapped up so neatly the first time round that it's a marvel of creative writting that it has managed to start off so cleanly. The authors must have planned this story to be a double.

Rating: 5 stars
Summary: Not Enough Stars for This Series
Review: I cannot express in words how refreshing it is to *finally* read the blow by blow details of "what if" hi tech fiction written by authors who *know* the specifics of the technology that they're describing! Outstanding is simply not enough. Dan Brown fans take note, if you think Mr Brown's excursions into what he imagines passes for "hi tech" story lines then you will be sorely disappointed with the STN series simply because you will not understand *any* of the technology. Keep up the good work, Syngress! I look forward to the next book in the STN series.

Rating: 5 stars
Summary: Cool concept, exceptional delivery
Review: I have read several books featuring Ryan Russell (Stealing the Network, Hackproofing Your Network, among others), Joe Grand (Stealing the Network, Hardware Hacking), and Russ Rogers (WarDriving: Drive Detect, Defend, Security Assessment: Case Studies for Implementing the NSA IAM) and have never been disappointed. This book was no exception. The story is presented in an easy to read style and the technical details are accurate and well presented.

I would recommend this book for anyone responsible for securing their networks, anyone interested in information security or vulnerability exploitation, and anyone who enjoys reading a good story. It's just a fun read.

Rating: 5 stars
Summary: A new classic!
Review: I read the first book in this series, and was both excited/skpetical when I saw their was a sequel coming out. I am often disapointed with sequels to books or movies, because it often seems like the creators rush out something new to try and make some quick $$. This is one of the very rare ocassions where as much as I liked the first, I like the second even better. The authors of this edition have raised the bar by interconnecting a series of short stories into a single, intriguing narrative. What's really impressive is the they accomplish this while still teaching you about network security and vulnerabilities. The details of the hacks while far-fetched in places are technically accurate and incredibly timely. As much as I liked the stories and the hacks, my favorite part of the book is actually an appendix that transcribes a series of e-mail threads amongst the authors as they wrote the book. It's rather intersesting to see the likes of Fyodor, Kevin Mitnick, Tim Mullen, Jay Beale, etc. argue about the plot, joke around, etc. This book presents an intriguing look into the minds and tactics of criminal hackers and info. sec professionals.

Rating: 5 stars
Summary: Note from an author
Review: I really enjoyed working on this book and hope you'll enjoy reading it. We've tried to keep each chapter both fun and educational by trying to capture fairly realistically what the attackers do, what they think of the targets (all our IT resources), and even sometimes what the admins should have done to defend better. From an educational perspective, the best thing you can carry away from this book is an attacker's view of your networks. My chapter follows a college kid through a fairly involved hack with a big payoff.

Rating: 5 stars
Summary: It's About Time!
Review: I've read just about every "hacker" and security book worth reading over the past few years, and honestly, most of them really were not worth reading. But, this book is truly unique and is well worth your time to read. The security industry is incredibly complex; technically, socially, and ethically; and this book reflects that. There are many very talented (and WAY TOO MANY not so talented) people on the right, the wrong, and the in between of cyber security. The landscape of the internet changes almost every minute. This book manages to communicate the technical and social intracicies at the same time through a fairly compelling story that also encompasses very challenging, technical information. This really is a must read for anyone involved with the security community.

Rating: 5 stars
Summary: It's About Time!
Review: I've read just about every "hacker" and security book worth reading over the past few years, and honestly, most of them really were not worth reading. But, this book is truly unique and is well worth your time to read. The security industry is incredibly complex; technically, socially, and ethically; and this book reflects that. There are many very talented (and WAY TOO MANY not so talented) people on the right, the wrong, and the in between of cyber security. The landscape of the internet changes almost every minute. This book manages to communicate the technical and social intracicies at the same time through a fairly compelling story that also encompasses very challenging, technical information. This really is a must read for anyone involved with the security community.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates