Goodreads helps you keep track of books you want to read.
Start by marking “Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)” as Want to Read:
Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)
Enlarge cover
Rate this book
Clear rating
Open Preview

Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)

by
4.09  ·  Rating Details  ·  75 Ratings  ·  2 Reviews
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealin
...more
Paperback, 409 pages
Published January 1st 2007 by Syngress Publishing
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Stealing the Network, please sign up.

Be the first to ask a question about Stealing the Network

Community Reviews

(showing 1-30 of 216)
filter  |  sort: default (?)  |  Rating Details
Hossam Khankan
Feb 07, 2011 Hossam Khankan rated it it was amazing
رواية مشوقة مليئة بالأحداث والإثارة تحبس الأنفاس
لا يمكنك التنبؤ بأحداثها، وهذا ما أدهشني باستمرار
ممتازة لمهاويس الكمبيوتر، تضاهي رواية الحصن الرقمي لدان براون بل تتفوق عليها، لكن مع كم أكبر من التفاصيل التقنية.

قد لا تكون مناسبة لجميع القراء وتتطلب خلفية معلوماتية هاكرجية محترمة !
Stephen
Aug 30, 2012 Stephen rated it really liked it
It was an overall good read.
Kevin
Kevin marked it as to-read
May 01, 2016
Allan Alcantara
Allan Alcantara marked it as to-read
Apr 25, 2016
Ronit Ray
Ronit Ray rated it it was amazing
Apr 17, 2016
KyLe
KyLe marked it as to-read
Apr 08, 2016
Brad
Brad marked it as to-read
Mar 27, 2016
Jer
Jer marked it as to-read
Mar 16, 2016
Christopher
Christopher marked it as to-read
Mar 16, 2016
Zachary
Zachary rated it it was amazing
Mar 14, 2016
Adam
Adam marked it as to-read
Mar 11, 2016
Zepyour Khacha
Zepyour Khacha marked it as to-read
Mar 10, 2016
Greg
Greg marked it as to-read
Mar 07, 2016
Stefan
Stefan marked it as to-read
Mar 06, 2016
Fakir Yahya
Fakir Yahya marked it as to-read
Mar 03, 2016
Toqa
Toqa marked it as to-read
Feb 26, 2016
Abeer Elassal
Abeer Elassal marked it as to-read
Feb 26, 2016
Niclas Åström
Niclas Åström rated it it was amazing
Feb 18, 2016
Martin
Martin marked it as to-read
Feb 07, 2016
Stefano Rizzo
Stefano Rizzo rated it really liked it
Feb 05, 2016
Karan Vyas
Karan Vyas is currently reading it
Jan 28, 2016
Dave Arsenault
Dave Arsenault rated it really liked it
Jan 24, 2016
Yuri
Yuri marked it as to-read
Jan 17, 2016
João Fraga
João Fraga marked it as to-read
Jan 17, 2016
Pablo
Pablo marked it as to-read
Feb 04, 2016
Janne
Janne marked it as to-read
Feb 22, 2016
Mr. Joseph
Mr. Joseph is currently reading it
Jan 02, 2016
« previous 1 3 4 5 6 7 8 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own a Continent
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Dissecting The Hack: The F0rb1dd3n Network
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Reversing: Secrets of Reverse Engineering
  • Nightwork: A History of Hacks and Pranks at MIT
  • Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
  • Inside Intel: Andy Grove and the Rise of the World's Most Powerful Chip Company
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • How to Disappear: Erase your Digital Footprint, Leave False Trails, and Vanish without A Trace
  • Practical Cryptography
  • 21 Dog Years: Doing Time @ Amazon.com
  • Writing Secure Code

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Other Books in the Series

Stealing the Network (4 books)
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own a Continent
  • Stealing the Network: How to Own an Identity

Share This Book