Hello agus,

Stealing the network series book


[img]http://i171.photobucket.com/albums/u291/warungplus01/159749081401sclzzzzzzzv4uu.jpg[/img]
[IMG]http://i58.photobucket.com/albums/g256/kakangmas/51J224CW16L.jpg[/IMG]
[IMG]http://i58.photobucket.com/albums/g256/kakangmas/515VD6E9B4L.jpg[/IMG]
[IMG]http://i58.photobucket.com/albums/g256/kakangmas/51MKC05VDDL.jpg[/IMG]



---------------------------------------------------------
Stealing the Network: How to Own an Identity


Book Description
The first two books in this series Stealing the Network: How to Own the Box and 
Stealing the Network: How to Own a Continent have become classics in the Hacker 
and Infosec communities because of their chillingly realistic depictions of 
criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the 
fastest growing crimes in the world: Identity Theft. Now, the criminal hackers 
readers have grown to both love and hate try to cover their tracks and vanish 
into thin air "Stealing the Network: How to Own an Identity" is the 3rd book in 
the "Stealing" series, and continues in the tradition created by its 
predecessors by delivering real-world network attack methodologies and hacking 
techniques within a context of unique and original fictional accounts created 
by some of the world's leading security professionals and computer 
technologists. The seminal works in TechnoFiction, this "STN" collection yet 
again breaks new ground by casting light upon the mechanics and methods used by 
those lurking on the darker side of the Internet, engaging in the fastest 
growing crime in the world: Identity theft.

Cast upon a backdrop of "Evasion," surviving characters from "How to Own a 
Continent" find themselves on the run, fleeing from both authority and 
adversary, now using their technical prowess in a way they never expected--to 
survive.

* The first two books in the series were best-sellers and have established a 
cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss 
from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on the book are world renowned, highly visible information 
security experts who present at all of the top security conferences including 
Black Hat, DefCon, and RSA and write for the most popular magazines and Web 
sites including Information Security Magazine, and SecurityFocus.com. All of 
these outlets will be used to promote the book

download:

http://rapidshare.com/files/28466289/Stealing_the_Network_-_How_to_Own_an_Identity.rar

------------------------------------------------------
Stealing the Network: How to Own the Box

Amazon.com
Stealing the Network is a book of science fiction. It's a series of short 
stories about characters who gain unauthorized access to equipment and 
information, or deny use of those resources to the people who are meant to have 
access to them. The characters, though sometimes well described, are not the 
stars of these stories. That honor belongs to the tools that the black-hat 
hackers use in their attacks, and also to the defensive measures arrayed 
against them by the hapless sysadmins who, in this volume, always lose. 
Consider this book, with its plentiful detail, the answer to every pretty but 
functionally half-baked user interface ever shown in a feature film.

One can read this book for entertainment, though its writing falls well short 
of cyberpunk classics like Burning Chrome and Snow Crash. Its value is in its 
explicit references to current technologies--Cisco routers, OpenSSH, Windows 
2000--and specific techniques for hacking them (the heroes and heroines of this 
book are always generous with command-history dumps). The specific detail may 
open your eyes to weaknesses in your own systems (or give you some ideas for, 
ahem, looking around on the network). Alternately, you can just enjoy the extra 
realism that the detail adds to these stories of packetized adventure. --David 
Wall

Slashdot.org, June 4, 2003
Stealing the Network is a refreshing change from more traditional computer 
books... 

download:

http://rapidshare.com/files/28457366/Stealing_the_Network_-_How_to_Own_the_Box.rar

-------------------------------------------------------------------
Stealing the Network: How to Own a Continent

Book Description
This is a book that will create enormous debate within the technical and the 
counter-terrorism communities. While there will be the inevitable criticism 
that the material contained in the book could be used maliciously, the fact is 
that this knowledge is already in the hands of our enemies. This book is truly 
designed to inform while entertaining (and scaring) the reader, and it will 
instantly be in demand by readers of "Stealing the Network: How to Own the Box"

* A meticulously detailed and technically accurate work of fiction that exposes 
the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and 
cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the 
world

Download Description
This is a book that will create enormous debate within the technical and the 
counter-terrorism communities. While there will be the inevitable criticism 
that the material contained in the book could be used maliciously, the fact is 
that this knowledge is already in the hands of our enemies. This book is truly 
designed to inform while entertaining (and scaring) the reader, and it will 
instantly be in demand by readers of "Stealing the Network: How to Own the 
Box". --This text refers to the Digital edition. 

download:

http://rapidshare.com/files/28455756/Syngress_Publishing_-_Stealing_The_Network._How_To_Own_A_Continent.rar

----------------------------------------------------------------------
Stealing the Network: How to Own a Shadow


Book Description
The best-selling Stealing the Network series reaches its climactic conclusion 
as law enforcement and organized crime form a high-tech web in an attempt to 
bring down the shadowy hacker-villain known as Knuth in the most technically 
sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress ground 
breaking, best-selling, Stealing the Network series. As with previous title, 
How to Own a Shadow is a fictional story that demonstrates accurate, highly 
detailed scenarios of computer intrusions and counter-strikes. In How to Own a 
Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked 
across the world and the Web by cyber adversaries with skill to match his own. 
Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist 
and torque everything from game stations, printers and fax machines to service 
provider class switches and routers steal, deceive, and obfuscate. From 
physical security to open source information gathering, Stealing the Network: 
How to Own a Shadow will entertain and educate the reader on every page. The 
books companion Web site will also provide special, behind-the-scenes details 
and hacks for the reader to join in the chase for Knuth.

The final book in the Stealing the Network series will be a must read for the 
50,000 readers worldwide of the first three titles

The companion Web site to the book will provide challenging scenarios from the 
book to allow the reader to track down Knuth

Law enforcement and security professionals will gain practical, technical 
knowledge for apprehending the most supplicated cyber-adversaries

About the Author
Johnny Long is a "clean-living" family guy who just so happens to like hacking 
stuff. Recently, Johnny has enjoyed writing stuff and presenting stuff at 
conferences, which has served as yet another diversion to a serious (and 
bill-paying) job as a professional hacker and security researcher for Computer 
Sciences Corporation. Johnny Johnny has written or contributed to several 
books, including Google Hacking for Penetration Tester from Syngress 
Publishing, which has secured rave reviews.

download:
http://rapidshare.com/files/14989794/Stealing_the_Network_How_to_Own_a_Shadow.rar
-------------------------------------------------------------------------------------





-----------------------
 www.oprekpc.com/forum/
 www.warungplus.com
----------------------- 
Best regards,
 Pangon
YM: [EMAIL PROTECTED] 
my ebook collection: 
                               mailto:[EMAIL PROTECTED]

Kirim email ke