undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes Cloud Drive Photos FIFA16 cliquez_ici Rentrée scolaire Shop Fire HD 6 Shop Kindle Paperwhite cliquez_ici Jeux Vidéo Bijoux Montres Montres
Stealing the Network: How to Own a Shadow et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Stealing the Network: How... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Bon | Détails
Vendu par -betterworldbooks-
État: D'occasion: Bon
Commentaire: Expedier des Etats-Unis. Distribution privu en 2-3 semaines. Nous proposons la communication par e-mail en francais. Ancien livre de bibliothèque. Peut contenir des étiquettes « de bibliothèque » Le dos et les coins peuvent montrer des signes d'usure. Les pages peuvent inclure des notes et quelques signes de feutre. Sous garantie de remboursement complet. Plus de plus d'un million clients satisfaits! Votre alphabétisation dans le monde achat avantages!
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Stealing the Network: How to Own a Shadow (Anglais) Broché – 1 février 2007


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 41,09
EUR 38,43 EUR 6,69

Livres anglais et étrangers
Lisez en version originale. Cliquez ici

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

· The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

· The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

· Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Biographie de l'auteur

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.



Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Extrait
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 12 commentaires
9 internautes sur 11 ont trouvé ce commentaire utile 
The SQL Injection Adventures of Pawn 14 juin 2007
Par Hive Mind - Publié sur Amazon.com
Format: Broché
Did you enjoy the previous three Stealing the Network books? Are you looking for more? Then move along now, nothing to see here.
The prior books were interesting because they introduced the reader to new ideas or new angles on old ideas, then moved on without belaboring them. If you wanted more details, there were often URLs provided. The last two tied the stories together with the intriguing Knuth character. But the folks running the project chose to switch to a new format, with fewer characters and stories, not to mention fewer authors, and fewer ways to split the profits.
After three books with the same (proven) formula, it's understandable the authors would want to try something new. Alas, it's a disaster.

Welcome to "How to Own a Shadow," aka "The SQL Injection Adventures of Pawn." Pawn is one of the new characters in this volume, and is the first StN character I hoped would get shot to death by the cops in a mini-mall parking lot. Yes, he's that irritating. Particularly after reading 40 pages about his childhood as a high-functioning autistic (or something like that), and around 100 pages of him performing SQL injection attacks. Most of which is totally unrelated to Knuth. Note to the authors: SQL injection is interesting, but if you want to write a book about it, just write a book about it. I even gave you a title, what more do you want? You can even recycle much of this book, like you recycled part of the last one here.

Oh, you noticed the real subtitle of the book, "The Chase for Knuth." First, one chases _after_ fugitives, and hunts or searches _for_ them. Not that it matters, because there's not much chasing or hunting going on in this book. There isn't much Knuth, either. We see him in the first hundred pages, which is mostly about his son analyzing poker software. That's the last we see of either of them. Because, really, this is "The Biography of Pawn." We do get 50 pages of Knuth at the end of the book, but don't get excited: it's all from the last book, added as obvious filler.

Speaking of filler, there's a 17 page advertorial thrown in for BiDiBLAH, which is commercial software by SensePost. Oddly enough, they're listed as technical advisors for the book. I'm sure it's a fine app, but the authors have forgotten about Knuth again, since it has nothing to do with the story. If it had been relevant, it might have been a less obnoxious addition.

Not everything is bad. There's a brief bit about RFID, which of course turns into how to use RFID for SQL attacks. We get to meet Knuth's supposedly dead wife, and a charming shrew she is. All in all, though, this book isn't worth reading unless you're a truly devoted fan of the series, or SQL. I'm still a fan of the previous books, and I hope the authors can recapture what made them so intriguing for their next book. I won't be buying that one until I'm sure it's not Book Two of the Pawn Saga, however.
Worst book in the series 24 juillet 2008
Par A. Drew - Publié sur Amazon.com
Format: Broché Achat vérifié
Remember "stealing the network, how to own the box" how groundbreaking and fun it was to read, an intesely technical, multifaceted thriller. Remember reading the next two books, how to own an identity and how to own a continent, glued to the pages as the authors seemlessly twisted what started off as an unorganised collection of stories in the first book into a over arching plot in the next two.

Now forget all that because the excellent story format of the first three books has been dumped. The whole book now is written by just three guys and they're not very good writers. Knuth the shadowy arch villian escapes the clutches of the NSA only set up seedy poker website and spend his time sampling the local prostitutes. We meet a new character pawn, who is a naieve ninja(literally) hacker extrodinaire, the only way he could be more awesome would be if he was a pirate as well as a ninja. How someone could be such an accomplished hacker and so freaking naieve I have no idea, you'd think the person who spends his whole day breaking into other peoples computers would be a little bit more paranoid about his interpersonal interactions instead of just trusting every person who tries to exploit him.

To top it all off, nothing happens in this book, we introduce 3 new characters and that is it. Nothing else of consequence.

I can only assume the authors got greedy and decided that they didn't want to cut anyone else in on this book so they could take all the money for themselves. They also seems to have decided that 1 book wouldn't give them enough money so they artificially elongated it and turn it into 2 books, hey maybe it's a triology who knows, this could be the next Star Wars, they can all be George Lucas.

Basically if you loved the other 3 books steer clear of this one, it stinks.
2 internautes sur 3 ont trouvé ce commentaire utile 
A serious dropping of the ball.... 26 janvier 2007
Par PenNameMe - Publié sur Amazon.com
Format: Broché
While the other books in this series are all excellent and intelligently written, this book falls extremely short of being worthy of the "stealing the network " name.

the beginning of this book tracks the action of knuth's son and where he comes to be. this portion of the book is quite interesting and goes on for a decent amount of time..

however,

after this point everything takes a serious turn for the worse- the stories from this point on seemingly get more and more distant from any logical path stemming from the original books.. towards the end a story begins about a boy and how he grows up to be a hacker, while an interesting read, its overly long and has absolutely nothing to do with the main premise of the book, only at the end does he get connected in a small way with any of the books main characters, and at that its not even explained how it came to be.

after you have meandered through all this information about how he came to be a hacker and the path he took to learn everything it is tacked on at the end, as if pure afterthought a connection to the main storyline.

i cannot believe that some of the creators voluntarily published this, or perhaps the small amount of people who composed this book compared to the others alludes to the fact that it was never going to be a complete project. while a good " hacker " book in some small respect.. reading documents easily available on the net and putting a storyline to them after the fact.. is exactly the opposite of what i have come to expect from the stealing the network series.

- i read this book from a pdf i recieved from ordering directly thru syngress because amazon was severely late in showing it was published.

-english is not my first language.. please forgive ;)
where is the shadow? 7 mars 2007
Par A S - Publié sur Amazon.com
Format: Broché Achat vérifié
The book is written much better than the previous ones in terms of style, it actually looks like it was very well proofread and edited, but it really lacks in substance which the previous books were full of! So we are introduced to some reverse engineering techniques (rather superficially), nothing new, it was covered to a much better extent in How to Own the Box, the very first book. Lots of extra background, often unnecessary and very predictable. A long story on a little 'different' boy who grows up to get very excited by sql injections... A story that somehow manages to be a bit entertaining, if not for an abrupt ending that leaves you with a surprised and disappointing look on your face. That's it? So who exactly was stealing whose shadow?

That was not even talking about a terribly delayed release. I pre-ordered this book in May 2006 and they kept pushing the date at least 5 times. And after all this waiting I get a half baked sql injection tutorial and learn pretty much zero about Knuth and how his story would end. Are they in for another sequel? This is not Star Wars after all.
Entertaining way to learn 4 avril 2007
Par Harrison Holland - Publié sur Amazon.com
Format: Broché
This book was excellent for someone interested in technology but has a hard time reading dull technical books. I have been interested in digital security for a while, but until recently hadn't played around with SQL injections. I was interested in learning more about them and pleased to see that this book offered an excellent primer on SQL injections in the form of a story, which held my interest. In addition there was a cool primer on RFID hacking which I really enjoyed. The supporting story was intriguing and kept me reading to find out what happened next.

There was a cliffhanger ending, and now I'm really looking forward to the next one.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?