Goodreads helps you keep track of books you want to read.
Start by marking “Stealing the Network: How to Own the Box” as Want to Read:
Stealing the Network: How to Own the Box
Enlarge cover
Rate this book
Clear rating
Open Preview

Stealing the Network: How to Own the Box

(Stealing the Network)

4.04  ·  Rating details ·  321 ratings  ·  11 reviews
-Stealing the Network: How to Own the Box- is NOT intended to be a -install, configure, update, troubleshoot, and defend book.- It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present ...more
Paperback, 448 pages
Published May 29th 2003 by Syngress Publishing (first published January 1st 2003)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Stealing the Network, please sign up.

Be the first to ask a question about Stealing the Network

Community Reviews

Showing 1-30
4.04  · 
Rating details
 ·  321 ratings  ·  11 reviews

More filters
Sort order
Dec 21, 2011 rated it liked it
Shelves: owned
Very interesting concept - instead of being a typical hacker or pen-testing howto guide, it's actually a collection of stories told from the viewpoint of hackers on accessing networks in different ways. I found the stories to be really interesting and enveloping, both from a technical and a true-crime-story kind of way, but many of the personalities of the storytellers left me really irritated - definitely a lot of that "teen hacker" stereotypical attitude of immaturity and arrogance. But still ...more
Dec 03, 2008 rated it really liked it
IT technology.
This kind of tech has been developes really fast since the 70's where Arpanet connect the first LAN. Along with the advance, came the flaw - Security. If your private network is your home, than prepare to lock the doors.

The book contains some short fiction stories based with real technology. I think this book is not particularly a hackers how to. It is a good book to know how hackers (best ones) would think and do to your network, and by so, helps us improving our defense.

I read
Amar Pai
Sep 22, 2012 rated it liked it
addendum 1/12/04: now that I've read 3 books in this series, I have to say volume 2, How to Own a Continent, is by far the best. I'd start with that.

Extremely realistic. Good for what it is. Don't bother unless you are ok with pages of unix console logs constituting large parts of each story. That said, this is pretty gripping for the right sort of person. Brian P might like it
Oct 16, 2018 rated it it was amazing
This book is the first book in the series "Stealing the Network" books. It's a cybersecurity fiction book about the world of hacking written in a format of a novel but with accurate and real technical content to satisfy any security geek or engineer.

The book has been written by multiple authors who are credible and distinguished names in the world of Cyber Security. Several independent stories each describing a different scenario involving a different type of hack.

What makes this book
Jan 07, 2014 rated it did not like it
This is bad. Really bad. This book was recommended to me by a colleague, but I couldn't get past the first third of the book.

Each chapter is written separately. They are all sort of like stand-alone short stories. The authors attempt to show you what different types of network attacks would be like through the use of fiction. I assume that they also try to give you a little knowledge about the subject (even though they claim that's not the point of the book) because otherwise the fiction would h
Apr 07, 2013 rated it really liked it
Shelves: cyber, computers
Solid book written by security/"pen-test" guys. I thought the stories were interesting and present what could be realistic scenarios. It has a good portrayal of the mindset of hackers and their relentlessness.

What the book is not: It's not a how to book for wannabe hackers. If you're looking for a guide on how to exploit systems, you'll want to look elsewhere (and my guess is not in a print book as those exploits will surely have been closed by the time you and thousands of others get your hands
Dan Holton
Feb 25, 2008 rated it really liked it
This was a fun book to read. It's been a while since I read it, but I do remember enjoying the read. As a technology professional with a security interest, this book is both educational and gives you other things to consider when thinking about the security of a solution you're working on implementing.
Feb 13, 2014 rated it liked it
Recommended to Brian by: Amar Pai
(3.0) Good concept, writing could be better

These aren't connected the way that the stories in Stealing the Network: How to Own a Continent. I agree with Amar: try that.
Jul 14, 2009 rated it liked it
I would probably rate higher if so much of the technical stuff wasn't over my head.
Mar 25, 2008 rated it liked it
Shelves: work
Interesting read. This is not your normal computer science book.
Erik Dominguez
Mar 28, 2014 rated it it was amazing
Great book for the techy person.

The stories are interesting, and seemingly accurate from a technical perspective. I really enjoyed it.
rated it it was amazing
Aug 28, 2008
Mark Burnett
Apr 30, 2016 rated it it was amazing  ·  (Review from the author)
Tanmoy Wangza
rated it it was amazing
Jul 29, 2018
rated it really liked it
Sep 07, 2012
rated it liked it
Jun 19, 2016
rated it it was amazing
Jan 07, 2009
rated it it was amazing
Nov 23, 2012
Peter Richards
rated it really liked it
Mar 31, 2019
rated it liked it
Jun 04, 2014
rated it liked it
Dec 14, 2007
rated it really liked it
Aug 19, 2008
rated it liked it
Dec 10, 2012
rated it liked it
Oct 01, 2015
rated it it was amazing
Sep 29, 2012
rated it really liked it
Jun 12, 2008
rated it really liked it
Feb 09, 2011
rated it really liked it
Mar 23, 2013
rated it it was amazing
Jul 21, 2015
rated it it was amazing
Mar 28, 2009
« previous 1 3 4 5 6 7 8 9 10 11 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Stealing the Network: How to Own an Identity
  • Reversing: Secrets of Reverse Engineering
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series (Stealing the Network)
  • Nightwork: A History of Hacks and Pranks at MIT
  • Beyond Fear: Thinking Sensibly about Security in an Uncertain World
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • The Best of 2600: A Hacker Odyssey
  • Metasploit: The Penetration Tester's Guide
  • Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
  • Writing Secure Code
  • Practical Cryptography
  • 21 Dog Years: Doing Time @
  • Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
  • Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Other books in the series

Stealing the Network (4 books)
  • Stealing the Network: How to Own a Continent
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own a Shadow (Stealing the Network) (Stealing the Network)