Your Ad Here

Friday, July 11, 2008

Syngress - Stealing the Network - Download ebook

Book info:
Stealing the Network: How to Own the Box
Ryan Russell Tim Mullen (Thor) FX Dan “Effugas” Kaminsky
Joe Grand Ken Pfeil Ido Durbrawsky
Mark Burnett Paul Craig
Syngress Publications
ebook format: PDF
ISBN-10: 1-931836-87-6

Product Description
You Are Who the Computer Says You Are
The first two books in this series, Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent, have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques and strategies. But what happens when the tables turn, and the criminal hackers become the targets of both law enforcement and each other? What happens when they must evade detection by creating new identities and applying their skills to get out fast and vanish into thin air. In Stealing the Network: How to Own an Identity, the hacker crew you've grown to both love and hate find themselves on the run, fleeing from both authority and adversary. They must now use their prowess in a way they never expected--to survive...

From the Diary of Robert Knoll, Senior My name, my real name, is Robert Knoll, Senior. No middle name. Most of those who matter right now think of me as Knuth. But I am the man of a thousand faces, the god of infinite forms.

Identity is a precious commodity. In centuries past, those who fancied themselves sorcerers believed that if you knew a being's true name, you could control that being. Near where I live now, there are shamans who impose similar beliefs on their people. The secret is that if you grant such a man, an agency, this power over yourself through your beliefs or actions, then it is true.

Only recently has this become true in the modern world. The people of the world have granted control of their existence to computers, networks, and databases. You own property if a computer says you do. You can buy a house if a computer says you may. You have money in the bank if a computer says so. Your blood type is what the computer says it is. You are who the computer says you are.

About the Author
Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

TOC

Part I Evasion

Prologue From the Diary of Robert Knoll, Senior

Chapter 1 In The Beginning

Chapter 2 Sins of the Father

Chapter 3 Saul on the Run

Chapter 4 The Seventh Wave

Chapter 5 Bl@ckTo\/\/3r

Chapter 6 The Java Script Caf

Chapter 7 Death by a Thousand Cuts

Chapter 8 A Really Gullible Genius Makes Amends

Chapter 9 Near Miss

Chapter 10 There's Something Else

Epilogue: The Chase

Part II Behind the Scenes

Chapter 11 The Conversation

Chapter 12 Social Insecurity

http://rapidshare.com/files/60170952/stealingthenetworkhowtoownthebox.pdf

0 comments:

 
Disclaimer:
This site does not store any files on its server.We only index and link to content provided by other sites and also if you feel any copyrighted material is seen in this blog ..
please feel to write us.. gnbcreation@yahoo.com