Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Stealing the Network: How to Own the Box", Ryan Russell et al

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKSTNHOB.RVW 20051023 Stealing the Network: How to Own the Box , Ryan Russell et al, 2003, 1-931836-87-6, C$49.95/U$69.95 %A Ryan Russell et al
    Message 1 of 1 , Jan 12, 2006
    • 0 Attachment
      BKSTNHOB.RVW 20051023

      "Stealing the Network: How to Own the Box", Ryan Russell et al, 2003,
      1-931836-87-6, C$49.95/U$69.95
      %A Ryan Russell et al BlueBoar@...
      %C 800 Hingham Street, Rockland, MA 02370
      %D 2003
      %G 1-931836-87-6
      %I Syngress Media, Inc.
      %O C$49.95/U$69.95 781-681-5151 fax: 781-681-3585 amy@...
      %O http://www.amazon.com/exec/obidos/ASIN/1931836876/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/1931836876/robsladesinte-21
      %O http://www.amazon.ca/exec/obidos/ASIN/1931836876/robsladesin03-20
      %O Audience i Tech 2 Writing 2 (see revfaq.htm for explanation)
      %P 303 p.
      %T "Stealing the Network: How to Own the Box"

      Like the subsequent "Stealing the Network: How to Own a Continent"
      (cf. BKSTNHOC.RVW), this is a work that uses fiction to try to
      demonstrate some of the techniques and dangers involved in computer
      intrusion. In this case, the individual stories stand alone, rather
      than being tied in a narrative thread, no matter how tenuous.

      Chapter one outlines standard discovery and enumeration. It is very
      difficult to say what chapter two is about: it mentions worm
      operations and disassembly, but also has a great deal of irrelevant
      narrative. A grab bag of industrial espionage makes up chapter three,
      mostly to do with physical access. Standard intrusion, with a minor
      in printers, makes up the thread in chapter four.

      Chapter five notes the more difficult task of directed intrusion. The
      dangers of wireless LANs are reviewed in chapter six. Chapter seven
      deals primarily with social engineering. The gathering of information
      from publicly available sources is outlined in chapter eight, which
      also examines physical social engineering. Chapter nine is entitled
      "BabelNet," and this is oddly appropriate in view of the perplexing
      narrative, but there are some interesting ideas about net scanning and
      mapping. Network forensic tracking of an intruder is explained in
      chapter ten. Final advice on security is listed in an appendix.

      The book is fiction, and therefore (in most places) easier to read
      than a technical work. It does provide some indication of the
      possibilities of intrusions. Personally, I didn't find it either as
      interesting or as useful as "How to Own the Continent," but I can't
      find really solid reasons why.

      copyright Robert M. Slade, 2005 BKSTNHOB.RVW 20051023


      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      I like long walks, especially when they are taken by people who
      annoy me. - Fred Allen
      http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.