Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Prix Kindle : EUR 29,50

EUR 15,81 (35%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Repliez vers l'arrière Repliez vers l'avant
Narration Audible Lecture en cours... Interrompu   Vous écoutez un extrait de la narration Audible pour ce livre Kindle.
En savoir plus

Stealing the Network: How to Own a Shadow Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 29,50

Longueur : 448 pages Optimisé pour de plus grands écrans Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger

Ponts de mai 2016 Promo Ponts de mai 2016

Descriptions du produit

Présentation de l'éditeur

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

· The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

· The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

· Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Biographie de l'auteur

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website ( He is the founder of Hackers For Charity(, an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 16683 KB
  • Nombre de pages de l'édition imprimée : 448 pages
  • Editeur : Syngress; Édition : 1 (18 avril 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°645.733 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur (beta) HASH(0x93222f24) étoiles sur 5 13 commentaires
9 internautes sur 11 ont trouvé ce commentaire utile 
HASH(0x9324aa14) étoiles sur 5 The SQL Injection Adventures of Pawn 14 juin 2007
Par Hive Mind - Publié sur
Format: Broché
Did you enjoy the previous three Stealing the Network books? Are you looking for more? Then move along now, nothing to see here.
The prior books were interesting because they introduced the reader to new ideas or new angles on old ideas, then moved on without belaboring them. If you wanted more details, there were often URLs provided. The last two tied the stories together with the intriguing Knuth character. But the folks running the project chose to switch to a new format, with fewer characters and stories, not to mention fewer authors, and fewer ways to split the profits.
After three books with the same (proven) formula, it's understandable the authors would want to try something new. Alas, it's a disaster.

Welcome to "How to Own a Shadow," aka "The SQL Injection Adventures of Pawn." Pawn is one of the new characters in this volume, and is the first StN character I hoped would get shot to death by the cops in a mini-mall parking lot. Yes, he's that irritating. Particularly after reading 40 pages about his childhood as a high-functioning autistic (or something like that), and around 100 pages of him performing SQL injection attacks. Most of which is totally unrelated to Knuth. Note to the authors: SQL injection is interesting, but if you want to write a book about it, just write a book about it. I even gave you a title, what more do you want? You can even recycle much of this book, like you recycled part of the last one here.

Oh, you noticed the real subtitle of the book, "The Chase for Knuth." First, one chases _after_ fugitives, and hunts or searches _for_ them. Not that it matters, because there's not much chasing or hunting going on in this book. There isn't much Knuth, either. We see him in the first hundred pages, which is mostly about his son analyzing poker software. That's the last we see of either of them. Because, really, this is "The Biography of Pawn." We do get 50 pages of Knuth at the end of the book, but don't get excited: it's all from the last book, added as obvious filler.

Speaking of filler, there's a 17 page advertorial thrown in for BiDiBLAH, which is commercial software by SensePost. Oddly enough, they're listed as technical advisors for the book. I'm sure it's a fine app, but the authors have forgotten about Knuth again, since it has nothing to do with the story. If it had been relevant, it might have been a less obnoxious addition.

Not everything is bad. There's a brief bit about RFID, which of course turns into how to use RFID for SQL attacks. We get to meet Knuth's supposedly dead wife, and a charming shrew she is. All in all, though, this book isn't worth reading unless you're a truly devoted fan of the series, or SQL. I'm still a fan of the previous books, and I hope the authors can recapture what made them so intriguing for their next book. I won't be buying that one until I'm sure it's not Book Two of the Pawn Saga, however.
HASH(0x9324ab34) étoiles sur 5 Worst book in the series 24 juillet 2008
Par A. Drew - Publié sur
Format: Broché Achat vérifié
Remember "stealing the network, how to own the box" how groundbreaking and fun it was to read, an intesely technical, multifaceted thriller. Remember reading the next two books, how to own an identity and how to own a continent, glued to the pages as the authors seemlessly twisted what started off as an unorganised collection of stories in the first book into a over arching plot in the next two.

Now forget all that because the excellent story format of the first three books has been dumped. The whole book now is written by just three guys and they're not very good writers. Knuth the shadowy arch villian escapes the clutches of the NSA only set up seedy poker website and spend his time sampling the local prostitutes. We meet a new character pawn, who is a naieve ninja(literally) hacker extrodinaire, the only way he could be more awesome would be if he was a pirate as well as a ninja. How someone could be such an accomplished hacker and so freaking naieve I have no idea, you'd think the person who spends his whole day breaking into other peoples computers would be a little bit more paranoid about his interpersonal interactions instead of just trusting every person who tries to exploit him.

To top it all off, nothing happens in this book, we introduce 3 new characters and that is it. Nothing else of consequence.

I can only assume the authors got greedy and decided that they didn't want to cut anyone else in on this book so they could take all the money for themselves. They also seems to have decided that 1 book wouldn't give them enough money so they artificially elongated it and turn it into 2 books, hey maybe it's a triology who knows, this could be the next Star Wars, they can all be George Lucas.

Basically if you loved the other 3 books steer clear of this one, it stinks.
2 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x9324ae04) étoiles sur 5 A serious dropping of the ball.... 26 janvier 2007
Par PenNameMe - Publié sur
Format: Broché
While the other books in this series are all excellent and intelligently written, this book falls extremely short of being worthy of the "stealing the network " name.

the beginning of this book tracks the action of knuth's son and where he comes to be. this portion of the book is quite interesting and goes on for a decent amount of time..


after this point everything takes a serious turn for the worse- the stories from this point on seemingly get more and more distant from any logical path stemming from the original books.. towards the end a story begins about a boy and how he grows up to be a hacker, while an interesting read, its overly long and has absolutely nothing to do with the main premise of the book, only at the end does he get connected in a small way with any of the books main characters, and at that its not even explained how it came to be.

after you have meandered through all this information about how he came to be a hacker and the path he took to learn everything it is tacked on at the end, as if pure afterthought a connection to the main storyline.

i cannot believe that some of the creators voluntarily published this, or perhaps the small amount of people who composed this book compared to the others alludes to the fact that it was never going to be a complete project. while a good " hacker " book in some small respect.. reading documents easily available on the net and putting a storyline to them after the fact.. is exactly the opposite of what i have come to expect from the stealing the network series.

- i read this book from a pdf i recieved from ordering directly thru syngress because amazon was severely late in showing it was published.

-english is not my first language.. please forgive ;)
HASH(0x9324f2d0) étoiles sur 5 where is the shadow? 7 mars 2007
Par A S - Publié sur
Format: Broché Achat vérifié
The book is written much better than the previous ones in terms of style, it actually looks like it was very well proofread and edited, but it really lacks in substance which the previous books were full of! So we are introduced to some reverse engineering techniques (rather superficially), nothing new, it was covered to a much better extent in How to Own the Box, the very first book. Lots of extra background, often unnecessary and very predictable. A long story on a little 'different' boy who grows up to get very excited by sql injections... A story that somehow manages to be a bit entertaining, if not for an abrupt ending that leaves you with a surprised and disappointing look on your face. That's it? So who exactly was stealing whose shadow?

That was not even talking about a terribly delayed release. I pre-ordered this book in May 2006 and they kept pushing the date at least 5 times. And after all this waiting I get a half baked sql injection tutorial and learn pretty much zero about Knuth and how his story would end. Are they in for another sequel? This is not Star Wars after all.
2 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x9324aaa4) étoiles sur 5 Entertaining way to learn 4 avril 2007
Par Harrison Holland - Publié sur
Format: Broché
This book was excellent for someone interested in technology but has a hard time reading dull technical books. I have been interested in digital security for a while, but until recently hadn't played around with SQL injections. I was interested in learning more about them and pleased to see that this book offered an excellent primer on SQL injections in the form of a story, which held my interest. In addition there was a cool primer on RFID hacking which I really enjoyed. The supporting story was intriguing and kept me reading to find out what happened next.

There was a cliffhanger ending, and now I'm really looking forward to the next one.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Discussions entre clients