Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Stealing The Network
How to Own the Box
1st Edition - May 15, 2003
Author: Syngress
Language: English
Paperback ISBN:9781931836876
9 7 8 - 1 - 9 3 1 8 3 6 - 8 7 - 6
eBook ISBN:9780080481111
9 7 8 - 0 - 0 8 - 0 4 8 1 1 1 - 1
Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker…Read more
Purchase options
LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions
Engineers and administrators, who: Protect their network and storage data from theft and/or corruption / Ensure both Web-based and internal application and data availability to customers, business partners, and employees
1. Hide and Sneak—Ido Dubrawsky
2. The Worm Turns
3. Just Another Day at the Office
4. h3X’s Adventures in Networkland—FX
5. The Thief No One Saw
6. Flying the Friendly Skies
7. dis-card
8. Social (In)Security
9. BabelNet
10. The Art of Tracking Appendix The Laws of Security