Series: Stealing the Network (Book 3)
Paperback: 450 pages
Publisher: Syngress; 1 edition (July 15, 2005)
Product Dimensions: 7.1 x 1 x 8.9 inches
Shipping Weight: 1.2 pounds (View shipping rates and policies)
Average Customer Review: 4.1 out of 5 stars See all reviews (10 customer reviews)
Best Sellers Rank: #1,778,805 in Books (See Top 100 in Books) #18 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > WAN #206 in Books > Computers & Technology > History & Culture > Computer & Internet Law #379 in Books > Computers & Technology > Networking & Cloud Computing > Intranets & Extranets
If you have undertaken efforts to protect your identity from theft, have you thought to check on the credit reports of your children? I certainly had not, but this is one of the hidden gems/tips in the just published How To Own an Identity (Raven Adler, Jay Beale, et al, Syngress Press, 2005, 450 Pages, ISBN 1597490067), the third book in Syngress' Stealing the Network series.While not the best book in the series (I believe the second book, How to Own A Continent, holds this distinction). But it is still a very good read, offering insights into how your identity is not only vulnerable to theft by individual hackers, but how these hackers may be just a pawn in larger attacks by organized crime and other groups. Like the first two books in the series, this book is presented as fiction laced with technical fact and education. The main characters are much the same, but you are given new insights and backstories about them.You may think you know a lot about social engineering, but this art form takes on new meaning and perspective when you read Chapter 6, "The Java Script Cafe". In fact this chapter provides a good back drop that leads to revelations on how a hacker might turn the tables on the very people they were trying to serve. The book may also make you think twice about how much the government may not be on your side in protecting you identity, whether it be by siding with the companies that buy and sell your information in the marketplace, or even some unnamed agencies that you think are working for you.It all makes for a very good read, but at the same time it does not flow together as well as the first two titles in the series. This may be a case of just too many authors contributing to one book, which is unfortunate.
The latest installment in Syngress' Stealing series is Stealing The Network - How to Own an Identity by Timothy Mullen, Johnny Long, Raven Alder, Jay Beale, Riley Eller, Brian Hatch, Chris Hurley, Jeff Moss, Tom Parker, and Ryan Russell. The reason there are so many authors is that each chapter is written by a different person with an emphasis on the type of security issues they know best. The net effect ends up being an informative novel with hacking details woven in.Since this is written in novel form, listing the table of contents wouldn't shed much light on what you're getting in the book. Suffice it to say that there is a lot of technical detail about particular hacks and social engineering attacks. The different writers cover various areas such as encryption and ciphers, hacking personal wi-fi networks to gain identity info, using credit card offers to help build alternate identities, and forensic examination of devices like fax machines and printers to gain knowledge of prior activity.From a review perspective, I wasn't quite as engrossed in this book as I was with the prior installments. For one, this tries to pick up where Own a Continent leaves off. Many of the characters and incidents in this book got their beginning there. If you could read the two back-to-back, you might find better continuity. As it's been awhile since I read Continent, the story line wasn't as fresh to me as it could have been. Also, the basic storyline is rather vague and hard to follow. I kept thinking that the book was like a "certain type" of movie where the story line is only there to transition between the "action" scenes. While I'm not expecting NYT Top 10 Fiction material, I was hoping for something a little more cohesive.
Stealing the Network: How to Own an Identity Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services Homesteading for Beginners: Self-sufficiency guide, Grow your own food, Repair your own home, Raising Livestock and Generating your own Energy (Homesteading, ... Start Your Own Corporation: Why the Rich Own Their Own Companies and Everyone Else Works for Them (Rich Dad Advisors) Monitor Your Home Network: A How-To Guide to Monitoring a Small, Private Network How To Set Up a Home Network With Windows 7: Your Step-By-Step Guide To Setting Up a Home Network With Windows 7 Home Network Handbook: Learn how to set up your home network Network Security Assessment: Know Your Network Network Programmability and Automation: Skills for the Next-Generation Network Engineer Effective TCP/IP Programming: 44 Tips to Improve Your Network Programs: 44 Tips to Improve Your Network Programs Wireless Network Administration A Beginner's Guide (Network Pro Library) Descubra los secretos del network marketing: Redes de Mercadeo y Network marketing (Spanish Edition) Stealing with Pride, Vol. 1: Advanced OSD Customizations for MDT 2013 and ConfigMgr 2012 R2 Stealing the General: The Great Locomotive Chase and the First Medal of Honor Undemocratic: Rogue, Reckless and Renegade: How the Government is Stealing Democracy One Agency at a Time Trampando Mortalidad, Robando Vida (Cheating Death, Stealing Life): The Eddie Guerrero Story (Spanish Edition) Stealing Sugar from the Castle: Selected and New Poems, 1950-2013 Stealing Home (The Sweet Magnolias Book 1) Stealing America: What My Experience with Criminal Gangs Taught Me about Obama, Hillary, and the Democratic Party Undemocratic: How Unelected, Unaccountable Bureaucrats Are Stealing Your Liberty and Freedom