9781597490818-1597490814-Stealing the Network: How to Own a Shadow

Stealing the Network: How to Own a Shadow

ISBN-13: 9781597490818
ISBN-10: 1597490814
Edition: 1
Author: Johnny Long, Ryan Russell, Timothy Mullen
Publication date: 2007
Publisher: Syngress
Format: Paperback 448 pages
FREE US shipping
Buy

From $63.65

Book details

ISBN-13: 9781597490818
ISBN-10: 1597490814
Edition: 1
Author: Johnny Long, Ryan Russell, Timothy Mullen
Publication date: 2007
Publisher: Syngress
Format: Paperback 448 pages

Summary

Stealing the Network: How to Own a Shadow (ISBN-13: 9781597490818 and ISBN-10: 1597490814), written by authors Johnny Long, Ryan Russell, Timothy Mullen, was published by Syngress in 2007. With an overall rating of 4.4 stars, it's a notable title among other True Crime (Computer Certification, Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Intranets & Extranets, Network Security, Security & Encryption) books. You can easily purchase or rent Stealing the Network: How to Own a Shadow (Paperback) from BooksRun, along with many other new and used True Crime books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book