Goodreads helps you keep track of books you want to read.
Start by marking “Stealing the Network: How to Own the Box” as Want to Read:
Stealing the Network: How to Own the Box
Enlarge cover
Rate this book
Clear rating
Open Preview

Stealing the Network: How to Own the Box

(Stealing the Network)

4.04  ·  Rating details ·  333 ratings  ·  11 reviews
-Stealing the Network: How to Own the Box- is NOT intended to be a -install, configure, update, troubleshoot, and defend book.- It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present ...more
Paperback, 448 pages
Published May 29th 2003 by Syngress Publishing (first published January 1st 2003)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Stealing the Network, please sign up.

Be the first to ask a question about Stealing the Network

Community Reviews

Showing 1-30
Average rating 4.04  · 
Rating details
 ·  333 ratings  ·  11 reviews

More filters
Sort order
Start your review of Stealing the Network: How to Own the Box
Dec 21, 2011 rated it liked it
Shelves: owned
Very interesting concept - instead of being a typical hacker or pen-testing howto guide, it's actually a collection of stories told from the viewpoint of hackers on accessing networks in different ways. I found the stories to be really interesting and enveloping, both from a technical and a true-crime-story kind of way, but many of the personalities of the storytellers left me really irritated - definitely a lot of that "teen hacker" stereotypical attitude of immaturity and arrogance. But still ...more
Dec 03, 2008 rated it really liked it
IT technology.
This kind of tech has been developes really fast since the 70's where Arpanet connect the first LAN. Along with the advance, came the flaw - Security. If your private network is your home, than prepare to lock the doors.

The book contains some short fiction stories based with real technology. I think this book is not particularly a hackers how to. It is a good book to know how hackers (best ones) would think and do to your network, and by so, helps us improving our defense.

I read
Amar Pai
Sep 22, 2012 rated it liked it
addendum 1/12/04: now that I've read 3 books in this series, I have to say volume 2, How to Own a Continent, is by far the best. I'd start with that.

Extremely realistic. Good for what it is. Don't bother unless you are ok with pages of unix console logs constituting large parts of each story. That said, this is pretty gripping for the right sort of person. Brian P might like it
Oct 16, 2018 rated it it was amazing
This book is the first book in the series "Stealing the Network" books. It's a cybersecurity fiction book about the world of hacking written in a format of a novel but with accurate and real technical content to satisfy any security geek or engineer.

The book has been written by multiple authors who are credible and distinguished names in the world of Cyber Security. Several independent stories each describing a different scenario involving a different type of hack.

What makes this book
Jan 07, 2014 rated it did not like it
This is bad. Really bad. This book was recommended to me by a colleague, but I couldn't get past the first third of the book.

Each chapter is written separately. They are all sort of like stand-alone short stories. The authors attempt to show you what different types of network attacks would be like through the use of fiction. I assume that they also try to give you a little knowledge about the subject (even though they claim that's not the point of the book) because otherwise the fiction would h
Apr 07, 2013 rated it really liked it
Shelves: cyber, computers
Solid book written by security/"pen-test" guys. I thought the stories were interesting and present what could be realistic scenarios. It has a good portrayal of the mindset of hackers and their relentlessness.

What the book is not: It's not a how to book for wannabe hackers. If you're looking for a guide on how to exploit systems, you'll want to look elsewhere (and my guess is not in a print book as those exploits will surely have been closed by the time you and thousands of others get your hands
Dan Holton
Feb 25, 2008 rated it really liked it
This was a fun book to read. It's been a while since I read it, but I do remember enjoying the read. As a technology professional with a security interest, this book is both educational and gives you other things to consider when thinking about the security of a solution you're working on implementing.
Feb 13, 2014 rated it liked it
Recommended to Brian by: Amar Pai
(3.0) Good concept, writing could be better

These aren't connected the way that the stories in Stealing the Network: How to Own a Continent. I agree with Amar: try that.
Jul 14, 2009 rated it liked it
I would probably rate higher if so much of the technical stuff wasn't over my head.
Mar 25, 2008 rated it liked it
Shelves: work
Interesting read. This is not your normal computer science book.
Erik Dominguez
Mar 28, 2014 rated it it was amazing
Great book for the techy person.

The stories are interesting, and seemingly accurate from a technical perspective. I really enjoyed it.
rated it it was amazing
Aug 28, 2008
Mark Burnett
Apr 30, 2016 rated it it was amazing  ·  (Review from the author)
Tanmoy Wangza
rated it it was amazing
Jul 29, 2018
rated it really liked it
Sep 07, 2012
rated it liked it
Jun 19, 2016
Donald McArthur
rated it it was amazing
Aug 05, 2020
rated it it was amazing
Jan 07, 2009
rated it it was amazing
Nov 23, 2012
Peter Richards
rated it really liked it
Mar 31, 2019
rated it liked it
Jun 04, 2014
rated it liked it
Dec 14, 2007
rated it really liked it
Aug 19, 2008
rated it liked it
Dec 10, 2012
rated it liked it
Oct 01, 2015
rated it it was amazing
Sep 29, 2012
rated it really liked it
Jun 12, 2008
rated it really liked it
Feb 09, 2011
rated it really liked it
Mar 23, 2013
rated it it was amazing
Jul 21, 2015
« previous 1 3 4 5 6 7 8 9 10 11 12 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
  • Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series (Stealing the Network)
  • Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
  • Hackers: Heroes of the Computer Revolution
  • Ubik
  • Coffin Road
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • How We Decide
  • Beyond Bodybuilding
  • Hacking the Future: Privacy, Identity, and Anonymity on the Web
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
  • Beyond Fear: Thinking Sensibly about Security in an Uncertain World
  • How Not to Die: Discover the Foods Scientifically Proven to Prevent and Reverse Disease
  • Loneliness: Human Nature and the Need for Social Connection
  • Solaris
  • The Hacker Playbook 3: Practical Guide To Penetration Testing
  • Getting to Yes: Negotiating Agreement Without Giving In
  • The Fine Art of Small Talk: How to Start a Conversation, Keep It Going, Build Networking Skills and Leave a Positive Impression!
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Other books in the series

Stealing the Network (4 books)
  • Stealing the Network: How to Own a Continent
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)

Related Articles

November is the time for aspiring writers to get serious about writing that book! It's National Novel Writing Month, the annual event designed to...
48 likes · 12 comments