The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing
The first two books in this series -Stealing the Network: How to Own the Box- and -Stealing the Network: How to Own a Continent- have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hackin
-Stealing the Network: How to Own the Box- is NOT intended to be a -install, configure, update, troubleshoot, and defend book.- It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is