Stealing The Network

How to Own the Box

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Stealing The Network by Syngress, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Syngress ISBN: 9780080481111
Publisher: Elsevier Science Publication: May 19, 2003
Imprint: Syngress Language: English
Author: Syngress
ISBN: 9780080481111
Publisher: Elsevier Science
Publication: May 19, 2003
Imprint: Syngress
Language: English

Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

  • Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
  • A highly provocative expose of advanced security exploits
  • Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"
  • Gives readers a "first ever" look inside some of the most notorious network intrusions
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

More books from Elsevier Science

Cover of the book The Laboratory Rabbit, Guinea Pig, Hamster, and Other Rodents by Syngress
Cover of the book Bus Transport by Syngress
Cover of the book Guide to Electroporation and Electrofusion by Syngress
Cover of the book Viral Gastroenteritis by Syngress
Cover of the book The Maternal-to-Zygotic Transition by Syngress
Cover of the book Comprehensive Biophysics by Syngress
Cover of the book Deep-Sea Sediments by Syngress
Cover of the book Application of Control Volume Based Finite Element Method (CVFEM) for Nanofluid Flow and Heat Transfer by Syngress
Cover of the book Ionic Liquids by Syngress
Cover of the book Metal Related Neurodegenerative Disease by Syngress
Cover of the book Physiology of Woody Plants by Syngress
Cover of the book Genomics of Cyanobacteria by Syngress
Cover of the book Collection of Simulated XRD Powder Patterns for Zeolites Fifth (5th) Revised Edition by Syngress
Cover of the book Optical Thin Films and Coatings by Syngress
Cover of the book Nanotechnology Cookbook by Syngress
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy