Goodreads helps you keep track of books you want to read.
Start by marking “Stealing the Network: How to Own a Continent” as Want to Read:
Stealing the Network: How to Own a Continent
Enlarge cover
Rate this book
Clear rating
Open Preview

Stealing the Network: How to Own a Continent

(Stealing the Network)

4.03  ·  Rating details ·  243 ratings  ·  10 reviews
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, ...more
Paperback, 402 pages
Published June 23rd 2004 by Syngress Publishing (first published January 1st 2004)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Stealing the Network, please sign up.

Be the first to ask a question about Stealing the Network

Community Reviews

Showing 1-30
Average rating 4.03  · 
Rating details
 ·  243 ratings  ·  10 reviews

More filters
Sort order
Amar Pai
Feb 06, 2014 rated it really liked it
This might be the best security book I've read. It reads like a suspense novel, but at the same time gives a fairly deep technical overview of how massive 'cyber-crimes' are accomplished. The book's suspense novel conceit is really useful as a way of communicating the concepts. I almost feel like this should be required reading for all developers. It's better than teaching security via endless boring Powerpoint slides. ("The elements of security are STRIDE. [next slide] S - Something. [next slid ...more
Prattle On, Boyo
May 17, 2013 rated it it was amazing
Shelves: favorites
I cannot express in words how refreshing it is to *finally* read the blow by blow details of "what if" hi tech fiction written by authors who *know* the specifics of the technology that they're describing! Outstanding is simply not enough. Dan Brown fans take note, if you think Mr Brown's excursions into what he imagines passes for "hi tech" story lines then you will be sorely disappointed with the STN series simply because you will not understand *any* of the technology. Keep up the good work, ...more
Jeremy Needle
Jul 22, 2008 rated it it was amazing
This title is perfect for most tech-savvy people who want to see overhead of a large-scale plan. Even those who aren't familiar w/ NMAP commands or the nature of telco will still benefit from seeing the phased planning of a global hack; and believe me ladies & gentlemen, this is as big as it gets. Medical records, third world service providers, international identity fraud...oh yeah. This is probably THE most realistic text out there.
Apr 12, 2007 rated it it was amazing
This is a good example of heavy tech geek factor meets prose. These guys are great, and this has actually inspired me for some corporate security awareness work.
Günther Leenaert
Apr 15, 2019 rated it really liked it
A great read! Edutainment fiction.
Feb 13, 2014 rated it really liked it
Recommended to Brian by: Amar Pai
(4.0) Great, not seamlessly connected nor well written but cool

I really liked the concept: a series of short stories linked together by a mastermind criminal who coerces hackers to do his bidding (without really knowing they're part of his "retirement plan"). Real vulnerabilities, real thought processes that an attacker would go through to win the prize.

Writing is pretty raw/bad, but could definitely see past that to the gold that's here. Especially the chapter that's an homage to Real Genius. G
Jan 16, 2016 rated it really liked it
Really good read - especially the last chapter, a real thriller. It's about hacking and so contains lots of computer/network technobabble. This will turn off a lot of casual readers but I found it interesting to learn a little bit about how people break into and take over computer systems (including telephone switch gear), how to social engineer (ie not directly use computers to break into other computers but how to get people to help do this and how to launder money.
Gave some insights into the
Gaurav Chaturvedi
May 07, 2013 rated it liked it
First of this book is written by geeks and not story tellers, so the sound and feel of this book lacks a lot.
But it more then makes it up in its technical details.

The chapters are written by different hackers, so the story lacks depth and its poorly tied together. I would suggest reading the book as different short stories rather then reading it as single piece of fiction.

Jan 04, 2015 rated it liked it
Shelves: technical
By now the technology is starting to get a little dated, but this book was a great read for the technical details behind what can go into a hack. It was very enjoyable from that perspective. The writing left a lot to be desired, especially a few select chapters. So if you can look beyond the pedantic, chauvinistic, and overly verbose text, then it's a fine book. :)
rated it it was amazing
Jul 31, 2007
Tully Rankin
rated it liked it
May 24, 2013
rated it really liked it
Dec 14, 2007
Dustin Lenz
rated it it was amazing
Jun 08, 2016
rated it it was amazing
Mar 17, 2014
rated it really liked it
Feb 14, 2009
Andy Parkes
rated it it was amazing
Feb 28, 2011
JC Cruz
rated it really liked it
May 24, 2019
A. W.L Frauenhauf
rated it liked it
Aug 24, 2017
Daniel Silva
rated it it was amazing
Dec 25, 2016
Chris Hart
rated it liked it
Jul 07, 2012
Sachin Gopal
rated it it was amazing
Jun 11, 2015
rated it really liked it
May 17, 2017
rated it really liked it
Sep 17, 2016
rated it really liked it
Jan 27, 2015
rated it liked it
May 30, 2017
rated it liked it
Nov 27, 2013
rated it it was amazing
Jan 04, 2012
rated it liked it
Sep 09, 2012
rated it really liked it
Oct 09, 2012
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Stealing the Network: How to Own an Identity
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • File System Forensic Analysis
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Nightwork: A History of Hacks and Pranks at MIT
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
  • Practical UNIX & Internet Security
  • Reversing: Secrets of Reverse Engineering
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • 21 Dog Years: Doing Time @
  • Network Warrior
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
  • Inside Intel: Andy Grove and the Rise of the World's Most Powerful Chip Company
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Other books in the series

Stealing the Network (4 books)
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)