Goodreads helps you keep track of books you want to read.
Start by marking “Stealing the Network: How to Own an Identity” as Want to Read:
Stealing the Network: How to Own an Identity
Enlarge cover
Rate this book
Clear rating
Open Preview

Stealing the Network: How to Own an Identity (Stealing the Network)

by
4.04  ·  Rating Details ·  101 Ratings  ·  4 Reviews
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world:
...more
Paperback, 333 pages
Published August 1st 2005 by Syngress Publishing (first published July 1st 2005)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Stealing the Network, please sign up.

Be the first to ask a question about Stealing the Network

Community Reviews

(showing 1-30 of 252)
filter  |  sort: default (?)  |  Rating Details
Amar Pai
Feb 12, 2014 Amar Pai rated it it was ok
Not as good as its predecessor, How to Own a Continent. If you're just going to read one of these, I'd go with that one instead.
Francis Liu
Aug 04, 2008 Francis Liu rated it really liked it
A great story. The technical details are no longer relevant as technology moves so quickly.

Useful for its insight into social engineering.
Stephen
Aug 30, 2012 Stephen rated it really liked it
Was an overall good read.
Sunilthamban
Nov 18, 2010 Sunilthamban rated it it was amazing
simply great
Ivan K.
Ivan K. marked it as to-read
Sep 21, 2016
Ali Alsarhan
Ali Alsarhan marked it as to-read
Sep 09, 2016
NN
NN marked it as to-read
Sep 09, 2016
Blake Frederick
Blake Frederick marked it as to-read
Sep 05, 2016
Glenn Toms
Glenn Toms rated it really liked it
Sep 04, 2016
Rui
Rui marked it as to-read
Aug 30, 2016
James Larisch
James Larisch marked it as to-read
Aug 28, 2016
Sumit Chauhan
Sumit Chauhan rated it really liked it
Aug 23, 2016
k.d.
k.d. marked it as to-read
Sep 10, 2016
J
J marked it as to-read
Aug 08, 2016
Davermckay
Davermckay rated it it was amazing
Aug 06, 2016
Patrick Dant
Patrick Dant rated it liked it
Aug 02, 2016
Adam Oliver
Adam Oliver marked it as to-read
Jul 27, 2016
ALLA BASIM
ALLA BASIM marked it as to-read
Jul 22, 2016
Pål Martin Lai
Pål Martin Lai marked it as to-read
Jul 17, 2016
Alison
Alison marked it as to-read
Jul 10, 2016
Jenya Lebed
Jenya Lebed marked it as to-read
Jun 28, 2016
Tyler
Tyler marked it as to-read
Jun 16, 2016
Karel
Karel marked it as to-read
Jun 10, 2016
Dustin Lenz
Dustin Lenz marked it as to-read
Jun 08, 2016
George Koutsog
George Koutsog rated it liked it
Jun 14, 2016
Adam Horsewood
Adam Horsewood rated it it was amazing
Jun 03, 2016
Holly
Holly marked it as to-read
Jun 01, 2016
Katie
Katie marked it as to-read
May 19, 2016
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)
  • Stealing the Network: How to Own a Continent
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Dissecting The Hack: The F0rb1dd3n Network
  • Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • File System Forensic Analysis
  • Nightwork: A History of Hacks and Pranks at MIT
  • Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
  • Reversing: Secrets of Reverse Engineering
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • Inside Intel: Andy Grove and the Rise of the World's Most Powerful Chip Company
  • Security Metrics: Replacing Fear, Uncertainty, and Doubt
  • Beyond Fear: Thinking Sensibly about Security in an Uncertain World
  • A Guide to LATEX: Document Preparation for Beginners and Advanced Users
  • 21 Dog Years: Doing Time @ Amazon.com

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Other Books in the Series

Stealing the Network (4 books)
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own a Continent
  • Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)

Share This Book