Hello agus, Stealing the network series book
[img]http://i171.photobucket.com/albums/u291/warungplus01/159749081401sclzzzzzzzv4uu.jpg[/img] [IMG]http://i58.photobucket.com/albums/g256/kakangmas/51J224CW16L.jpg[/IMG] [IMG]http://i58.photobucket.com/albums/g256/kakangmas/515VD6E9B4L.jpg[/IMG] [IMG]http://i58.photobucket.com/albums/g256/kakangmas/51MKC05VDDL.jpg[/IMG] --------------------------------------------------------- Stealing the Network: How to Own an Identity Book Description The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities * Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005 * All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book download: http://rapidshare.com/files/28466289/Stealing_the_Network_-_How_to_Own_an_Identity.rar ------------------------------------------------------ Stealing the Network: How to Own the Box Amazon.com Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film. One can read this book for entertainment, though its writing falls well short of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its explicit references to current technologies--Cisco routers, OpenSSH, Windows 2000--and specific techniques for hacking them (the heroes and heroines of this book are always generous with command-history dumps). The specific detail may open your eyes to weaknesses in your own systems (or give you some ideas for, ahem, looking around on the network). Alternately, you can just enjoy the extra realism that the detail adds to these stories of packetized adventure. --David Wall Slashdot.org, June 4, 2003 Stealing the Network is a refreshing change from more traditional computer books... download: http://rapidshare.com/files/28457366/Stealing_the_Network_-_How_to_Own_the_Box.rar ------------------------------------------------------------------- Stealing the Network: How to Own a Continent Book Description This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world Download Description This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box". --This text refers to the Digital edition. download: http://rapidshare.com/files/28455756/Syngress_Publishing_-_Stealing_The_Network._How_To_Own_A_Continent.rar ---------------------------------------------------------------------- Stealing the Network: How to Own a Shadow Book Description The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries About the Author Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Recently, Johnny has enjoyed writing stuff and presenting stuff at conferences, which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. Johnny Johnny has written or contributed to several books, including Google Hacking for Penetration Tester from Syngress Publishing, which has secured rave reviews. download: http://rapidshare.com/files/14989794/Stealing_the_Network_How_to_Own_a_Shadow.rar ------------------------------------------------------------------------------------- ----------------------- www.oprekpc.com/forum/ www.warungplus.com ----------------------- Best regards, Pangon YM: [EMAIL PROTECTED] my ebook collection: mailto:[EMAIL PROTECTED]
