rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781597490061

Stealing the Network: How to Own an Identity

by ; ; ; ; ;
  • ISBN13:

    9781597490061

  • ISBN10:

    1597490067

  • Format: Paperback
  • Copyright: 2005-07-01
  • Publisher: Elsevier Science
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $44.95 Save up to $0.04
  • Buy New
    $44.91
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book

Table of Contents

Foreword xxi
Part I Evasion
1(290)
Prologue From the Diary of Robert Knoll, Senior
3(4)
Ryan Russell
In the Beginning
7(16)
Caezar
Sins of the Father
23(30)
Ryan Russell
Robert
Saul on the Run
53(32)
Chris Hurley
Saul
The Seventh Wave
85(26)
Thor
Ryan
Bl@ck To W3r
111(30)
Brian Hatch
Glenn
The Java Script Cafe
141(14)
Raven Alder
Natasha
Death by a Thousand Cuts
155(56)
Johnny Long
Anthony Kokocinski
A Really Gullible Genius Makes Amends
211(24)
Jay Beale
Flir
Near Miss
235(38)
Tom Parker
Carlton
There's Something Else
273(18)
Johnny Long
Anthony Kokocinski
Epilogue: The Case
291(8)
Johnny Long
Part II Behind the Scenes
299
The Conversation
301(30)
Jeff Moss
Tom
Social Insecurity
331
Thor

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program