Book description
Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.- Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
- A highly provocative expose of advanced security exploits
- Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"
- Gives readers a "first ever" look inside some of the most notorious network intrusions
Table of contents
- Cover
- Title Page
- Copyright
- Acknowledgments
- Contributors
- Technical Editor
- Foreword
- Table of Contents
- Chapter 1: Hide and Sneak
- Chapter 2: The Worm Turns
- Chapter 3: Just Another Day at the Office
- Chapter 4: h3X’s Adventures in Networkland
- Chapter 5: The Thief No One Saw
- Chapter 6: Flying the Friendly Skies
- Chapter 7: dis-card
- Chapter 8: Social (In)Security
- Chapter 9: BabelNet
- Chapter 10: The Art of Tracking
-
Appendix: The Laws of Security
- Introduction
- Knowing the Laws of Security
- Client-Side Security Doesn’t Work
- You Cannot Securely Exchange Encryption Keys without a Shared Piece of Information
- Malicious Code Cannot Be 100 Percent Protected against
- Any Malicious Code Can Be Completely Morphed to Bypass Signature Detection
- Firewalls Cannot Protect You 100 Percent from Attack
- Any IDS Can Be Evaded
- Secret Cryptographic Algorithms Are Not Secure
- If a Key Is Not Required, You Do Not Have Encryption—You Have Encoding
- Passwords Cannot Be Securely Stored on the Client Unless There Is Another Password to Protect Them
- In Order for a System to Begin to Be Considered Secure, It Must Undergo an Independent Security Audit
- Security through Obscurity Does Not Work
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Instructions for Online Access
Product information
- Title: Stealing The Network
- Author(s):
- Release date: May 2003
- Publisher(s): Syngress
- ISBN: 9780080481111
You might also like
book
Stealing the Network
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime …
book
Passport to Profits: Why the Next Investment Windfalls Will Be Found Abroad and How to Grab Your Share
Emerging market investment advice from a seasoned pro Mark Mobius, the man the Wall Street Journal …
book
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
"Stealing the Network: How to Own the Box is a unique book in the fiction department. …
book
Build a Profitable Online Business: The No-Nonsense Guide
Build a Profitable Online Business: The No Nonsense Guide is a highly condensed step-by-step guide on …