Stealing the Network: How to Own an Identity

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Stealing the Network: How to Own an Identity by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch ISBN: 9780080517742
Publisher: Elsevier Science Publication: August 24, 2005
Imprint: Syngress Language: English
Author: Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
ISBN: 9780080517742
Publisher: Elsevier Science
Publication: August 24, 2005
Imprint: Syngress
Language: English

The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.

Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.

Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book

More books from Elsevier Science

Cover of the book Bioprocessing for Value-Added Products from Renewable Resources by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Varieties of Early Experience: Implications for the Development of Declarative Memory in Infancy by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Kidney and Body Fluids by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Plasma Etching Processes for Interconnect Realization in VLSI by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Green Trading Markets: by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Lightweight Ballistic Composites by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Design for Emotion by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Molecular Biology and Genomics by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Macroeconomics of Climate Change in a Dualistic Economy by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Recent Advances in Multidisciplinary Applied Physics by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Earthquakes and Coseismic Surface Faulting on the Iranian Plateau by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Security Operations Management by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book The Role of Functional Food Security in Global Health by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book Sulfuric Acid Manufacture by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
Cover of the book RCS Synthesis for Chipless RFID by Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy