Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Stealing the Network - How to Own an Identity (Paperback, Parental Adviso)
Loot Price: R1,398
Discovery Miles 13 980
|
|
Stealing the Network - How to Own an Identity (Paperback, Parental Adviso)
Expected to ship within 10 - 15 working days
|
The first two books in this series "Stealing the Network: How to
Own the Box" and "Stealing the Network: How to Own a Continent"
have become classics in the Hacker and Infosec communities because
of their chillingly realistic depictions of criminal hacking
techniques.
In this third installment, the all-star cast of authors tackle one
of the fastest growing crimes in the world: Identity Theft. Now,
the criminal hackers readers have grown to both love and hate try
to cover their tracks and vanish into thin air... "Stealing the
Network: How to Own an Identity" is the 3rd book in the "Stealing"
series, and continues in the tradition created by its predecessors
by delivering real-world network attack methodologies and hacking
techniques within a context of unique and original fictional
accounts created by some of the world's leading security
professionals and computer technologists. The seminal works in
TechnoFiction, this "STN" collection yet again breaks new ground by
casting light upon the mechanics and methods used by those lurking
on the darker side of the Internet, engaging in the fastest growing
crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How
to Own a Continent" find themselves on the run, fleeing from both
authority and adversary, now using their technical prowess in a way
they never expected--to survive.
* The first two books in the series were best-sellers and have
established a cult following within the Hacker and Infosec
communities
* Identity theft is the fastest growing crime in the world, and
financial loss from identity theft is expected to reach $2 trillion
by the end of 2005
* All of the authors on thebook are world renowned, highly visible
information security experts who present at all of the top security
conferences including Black Hat, DefCon, and RSA and write for the
most popular magazines and Web sites including Information Security
Magazine, and SecurityFocus.com. All of these outlets will be used
to promote the book
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.