Skip to content
Paperback Stealing the Network: How to Own an Identity Book

ISBN: 1597490067

ISBN13: 9781597490061

Stealing the Network: How to Own an Identity

(Part of the Stealing the Network Series)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$5.79
Save $39.16!
List Price $44.95
Almost Gone, Only 1 Left!

Book Overview

The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to...

Customer Reviews

5 ratings

Great continuation of the series

I give it 5 stars because not only is it a great hacker thriller but the use of character names from the 80s movie Real Genius cracks me up. Its like the movie's sequel.

One of the most innovative adn unique books on the mindset of a hacker

This book is hard to put down! It was like looking into a window of the underground world that most people, even those in the Information Security Industry, are unaware exists. The technical aspects in thoe book gave the storyline a credibility that other books lack. The characters were colorful and well developed. The book opened my eyes to the very real threat of identity theft and how identities are "harevsted" and used as currency on the blackmarket by organized crime and malicious entities such as terrorist organizationa. Great read that will not diassapoint you.

Fascinating and Intriguing but needs a better ending

Following in the tradition of the previous books of the "Stealing the Network" series and several other O'Reilly computer security books, this installment gives an interesting view of identity theft and how it can be used. The editors assembled a wide range of computer security talent to show the way identity theft can be abused for crime. This work of fiction is closer to truth than you'd wish possible. These sobering tales of computer exploits explains the motto "Control Information, Control Life." It's a scary thought that this much information (and therefore power) is so easily available online. The book makes an interesting point about how some people will be secure in protecting their personal information, but then post genealogy information online freely without realizing its value to crackers. Learning to "know your enemy" in the computer realm requires a pirate's intuition, savvy? Chapter 2 is a neat scenario for creating and cracking codes. My wonder is where did all the money comes from and what was his father up to? Chapter 3 sounds frightfully easy to do - knowledge is power. The stories are compelling and interesting, arousing both fear and intrigue. This shows how close fiction and real life can be. Parts of the book and the ending are somewhat hard to follow and I found the ending disappointing. Although you get the endgame of the story, it'd like to learn more about the lessons learned from such an experience. In thinking through all these activities, what can be learned for prevention of identity theft for our individual, business, and government responsibilities? The book doesn't fully address the added possibilities of fraud, cyber stalking, information abuse, blackmail, and spamming that these cyber capabilities allow.

Important info in a somewhat vague storyline...

The latest installment in Syngress' Stealing series is Stealing The Network - How to Own an Identity by Timothy Mullen, Johnny Long, Raven Alder, Jay Beale, Riley Eller, Brian Hatch, Chris Hurley, Jeff Moss, Tom Parker, and Ryan Russell. The reason there are so many authors is that each chapter is written by a different person with an emphasis on the type of security issues they know best. The net effect ends up being an informative novel with hacking details woven in. Since this is written in novel form, listing the table of contents wouldn't shed much light on what you're getting in the book. Suffice it to say that there is a lot of technical detail about particular hacks and social engineering attacks. The different writers cover various areas such as encryption and ciphers, hacking personal wi-fi networks to gain identity info, using credit card offers to help build alternate identities, and forensic examination of devices like fax machines and printers to gain knowledge of prior activity. From a review perspective, I wasn't quite as engrossed in this book as I was with the prior installments. For one, this tries to pick up where Own a Continent leaves off. Many of the characters and incidents in this book got their beginning there. If you could read the two back-to-back, you might find better continuity. As it's been awhile since I read Continent, the story line wasn't as fresh to me as it could have been. Also, the basic storyline is rather vague and hard to follow. I kept thinking that the book was like a "certain type" of movie where the story line is only there to transition between the "action" scenes. While I'm not expecting NYT Top 10 Fiction material, I was hoping for something a little more cohesive. If the material contained in the book wasn't so important, I probably wouldn't rate this book as highly as I am. Even with having said that, it's still a book worth reading for those who are not up-to-speed on identity theft. The technical info is sound, and you'll never view your mailbox as being secure again...

Have You Checked Your Childrens' Credit Reports?

If you have undertaken efforts to protect your identity from theft, have you thought to check on the credit reports of your children? I certainly had not, but this is one of the hidden gems/tips in the just published How To Own an Identity (Raven Adler, Jay Beale, et al, Syngress Press, 2005, 450 Pages, ISBN 1597490067), the third book in Syngress' Stealing the Network series. While not the best book in the series (I believe the second book, How to Own A Continent, holds this distinction). But it is still a very good read, offering insights into how your identity is not only vulnerable to theft by individual hackers, but how these hackers may be just a pawn in larger attacks by organized crime and other groups. Like the first two books in the series, this book is presented as fiction laced with technical fact and education. The main characters are much the same, but you are given new insights and backstories about them. You may think you know a lot about social engineering, but this art form takes on new meaning and perspective when you read Chapter 6, "The Java Script Cafe". In fact this chapter provides a good back drop that leads to revelations on how a hacker might turn the tables on the very people they were trying to serve. The book may also make you think twice about how much the government may not be on your side in protecting you identity, whether it be by siding with the companies that buy and sell your information in the marketplace, or even some unnamed agencies that you think are working for you. It all makes for a very good read, but at the same time it does not flow together as well as the first two titles in the series. This may be a case of just too many authors contributing to one book, which is unfortunate. But it does not mean you should not read the book. It is an important topic to understand or at least try to. Some portions may be too technical for nontechnical readers, but that should not dissuade this potential audience. Now go and check your childrens' credit reports. I know that I am. The Scorecard Birdie on A Downwind Par 5 Easily Reachable in 2
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured