Amazon Price: N/A (as of September 25, 2017 10:35 –
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Continue reading “Stealing the Network: How to Own an Identity: How to Own an Identity”
Amazon Price: N/A (as of September 25, 2017 17:46 –
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
Continue reading “Stealing the Network: How to Own a Shadow”
Amazon Price: N/A (as of September 25, 2017 16:05 –
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world