Newsletter   Secure Checkout   Shopping Cart (0 Items)  
Search:    Welcome Guest! Save up to 30-40% on most items with our awesome everyday discounts!

Stealing the Network: How to Own the Box [Paperback]

By Ryan Russell (Editor)
Our Price $ 54.03  
Item Number 258632  
Buy New $54.03
Available on the Internet only.

Item description for Stealing the Network: How to Own the Box by Ryan Russell...

This bestselling title is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT going to be another one of the countless Hacker books out there now by our competition. So, what IS it going to be? "Stealing the Network: How to Own the Box" is going to be an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities will present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book will portray the "street fighting" tactics used to attack networks and systems

Outline Review
Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.

One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall

Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at!

Item Specifications...

Pages   303
Est. Packaging Dimensions:   Length: 0.25" Width: 7.25" Height: 9.25"
Weight:   1.5 lbs.
Binding  Softcover
Release Date   Apr 1, 2003
Publisher   Syngress
ISBN  1931836876  
ISBN13  9781931836876  

Availability  82 units.
Availability accurate as of Oct 28, 2016 06:26.
Usually ships within one to two business days from La Vergne, TN.
Orders shipping to an address other than a confirmed Credit Card / Paypal Billing address may incur and additional processing delay.

More About Ryan Russell

Register your artisan biography and upload your photo! Russell is MIS Manager at, has served as an expert witness on security topics, and has done internal security investigation for a major software vendor. He has been working in the IT field for over 11 years. He has a BS degree in Computer Science.

Ryan Russell was born in 1969.

Are You The Artisan or Author behind this product?
Improve our customers experience by registering for an Artisan Biography Center Homepage.

Product Categories

1Books > Special Features > New & Used Textbooks > Computer Science & Information Systems > Networking
2Books > Subjects > Business & Investing > Industries & Professions > E-commerce > E-commerce
3Books > Subjects > Computers & Internet > Certification Central > General
4Books > Subjects > Computers & Internet > Digital Business & Culture > Hackers
5Books > Subjects > Computers & Internet > Digital Business & Culture > Privacy
6Books > Subjects > Computers & Internet > General
7Books > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > General
8Books > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > Network Security
9Books > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > Networks

Reviews - What do customers think about Stealing the Network: How to Own the Box?

Fun for all  Sep 7, 2008
This is a entertaining peek into the mindset of hackers. It's definitely not a "how-to" manual to exploiting a system, but it gives you a great overview of the steps involved. Everyone from system administrators to curious home computer users should read this book. Not only will you learn a few things about how you should be securing your (or your employer's) valuables, but you will have a few good laughs as well.
Good read  Jun 15, 2008
Nutshell review - A fun to read and enjoyable book. Some good scenarios and interesting analysis of various attacks and defences.
Fiction that hits too close to home  Jan 9, 2007
While they present this as a work of fiction, there is a large amount of information that can be immediately applied to your own situations. The authors mention that the stories come from real-life experiences or observations, and it is very easy to believe them. This is a great read for any network engineer or network administrator though don't read it at night, case some of the stories can be a little frightening, and you don't necessarily want the nightmares in your sleep.
Entertaining in it's own right...  Aug 16, 2006
The Stealing the Network series of books is in a catagory on it's own. Thrilling, entertaining, and fun to read just scratches the surface of these books. I'll recommend this book to anybody, from joe sixpack who only uses the internet for games and pr0n to mitnick himself.

The highly detailed accounts immerse the reader in a truly fantastic series of stories of hackers and their techniques. Remember, the game is a mental one...
Useful, readable illustration of computer security concepts  Oct 31, 2005
_Stealing the Network: How to Own the Box_ has 10 stories with a first person narrator, who is either an attacker, or in two cases, a defender. While the characterization isn't up to the standards of (good) commercial fiction* in most cases, it makes the technical medicine go down easier and gives a picture of who and why people do this stuff. That picture is useful in making an abstraction feel more like a concrete threat.

I think this would be a good intro for a non-technical manager of security staff who needs to know why we have to worry about these things. It's a faster read than Bruce Schneir's admirable _Secrets and Lies_, which is a straight discussion of how to think about security, and probably more rigorous and complete. This offers specific examples and leads to many similar lessons. I will read the next one, How to Own a Continent, when its turn comes up in the queue.

One quibble: for a book published in 2003, with a chapter that mentions Snort a couple of times, I was disappointed in the Laws of Security Appendix. Specifically, the Law that "Any IDS can be Evaded" contains some material that is way out of date. To state that "free ones are starting to come available" at least a decade after Shadow, and at least a couple of years after Snort surpassed proprietary intrusion detection solutions, is a bit, well, weird. Snort is big time - Checkpoint just bought the company that writes it. The two chapters telling a defender's tale refer to Snort.

Also, I'm not convinced of the law's validity. The escalation between intrusion evaders and detectors is an interesting one but I think IDS has the advantage in this go-round. We can detect it, if we're watching the right things. Many of the evasion techniques are themselves alertable!

Apart from that, I found myself nodding in agreement with most of what was said. This taught me some things, and I've read pretty widely. This title is available cheap if you look at used. Check it out.

*It's at least better than Tom Clancy, whose plots are the only thing separating him from pure cheese, the male equivalent of a romance novel.

Write your own review about Stealing the Network: How to Own the Box

Ask A Question or Provide Feedback regarding Stealing the Network: How to Own the Box

Item Feedback and Product Questions
For immediate assistance call 888.395.0572 during the hours of 10am thru 8pm EST Monday thru Friday and a customer care representative will be happy to help you!

Help us continuously improve our service by reporting your feedback or questions below:

I have a question regarding this product
The information above is incorrect or conflicting
The page has misspellings or incorrect grammar
The page did not load correctly in my browser or created an error.

Email Address:
Anti Spam Question. To combat spammers we require that you answer a simple question.
What color is the sky?
Leave This Blank :
Do Not Change This Text :

Add This Product Widget To Your Website

Looking to add this information to your own website? Then use our Product Widget to allow you to display product information in a frame that is 120 pixels wide by 240 pixels high.

    Copy and paste the following HTML into your website and enjoy!

Order toll-free weekdays 10am thru 10pm EST by phone: 1-888-395-0572 (Lines are closed on holidays & weekends.)
Customer Service | My Account | Track My Orders | Return Policy | Request Free Catalog | Email Newsletter

Gift Certificates
RSS Feeds
About Us
Contact Us
Terms Of Use
Privacy Policy