Home | Amazing | Today | Tags | Publishers | Years | Search 
Stealing the Network: How to Own a Continent

Buy
This book outlines a fictional plot to "own the box" by compromising an entire continent's network infrastructure. It combines a set of stories with real technology to show readers the danger that lurks in the shadows of the information security industry.

The first book in this series Stealing the Network: How to Own the Box created a new genre of “Cyber-Thrillers,” that told fictional stories about individual hackers using real technologies. This second book in the series Stealing the Network: How to Own a Continent (or STC for short) introduces the concept of hacker groups, and the damage they can inflict through a concerted, orchestrated string of malicious attacks. The “Stealing” books are unique in both the fiction and computer book categories. They combine accounts that are fictional with technology that is very real. While none of these specific events have happened, there is no reason why they could not. You could argue it provides a roadmap for criminal hackers, but I say it does something else: It provides a glimpse into the creative minds of some of today’s best hackers, and even the best hackers will tell you that the game is a mental one. The phrase “Root is a state of mind,” coined by K0resh and printed on shirts from DEF CON, sums this up nicely. While you may have the skills, if you lack the mental fortitude, you will never reach the top. This is what separates the truly elite hackers from the wannabe hackers.

When I say hackers, I don’t mean criminals. There has been a lot of confusion surrounding this terminology, ever since the mass media started reporting computer break-ins. Originally, it was a compliment applied to technically adept computer programmers and system administrators. If you had a problem with your system and you needed it fixed quickly, you got your best hacker on the job. They might “hack up” the source code to fix things, because they knew the big picture. While other people may know how different parts of the system work, hackers have the big picture in mind while working on the smallest details. This perspective gives them great flexibility when approaching a problem, because they don’t expect the first thing they try to work.

The book Hackers: Heroes of the Computer Revolution, by Steven Levy (1984), really captured the early ethic of hackers and laid the foundation for what was to come. Since then, the term hacker has been co-opted through media hype and marketing campaigns to mean something evil. It was a convenient term already in use, and so instead of simply saying someone was a criminal hacker, the media just called him a hacker. You would not describe a criminal auto mechanic as simply a mechanic, and you shouldn’t do the same with a hacker, either.

Distributed Game Development: Harnessing Global Talent to Create Winning Games
Distributed Game Development: Harnessing Global Talent to Create Winning Games

Take control of your global game development team and make successful AAA game titles using the 'Distributed Development' model. Game industry veteran Tim Fields teaches you how to evaluate game deals, how to staff teams for highly distributed game development, and how to maintain challenging relationships in order to get great games...

Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and Applications
Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and Applications

The conformal predictions framework is a recent development in machine learning that can associate a reliable measure of confidence with a prediction in any real-world pattern recognition application, including risk-sensitive applications such as medical diagnosis, face recognition, and financial risk prediction. Conformal Predictions for...

Super Trader: Make Consistent Profits in Good and Bad Markets
Super Trader: Make Consistent Profits in Good and Bad Markets

How do you transform yourself from mild-mannered investor to Super Trader? Think clearly. Plan accordingly. Commit completely. In other words, become a trader. And no one is better suited to help you make the transformation than legendary trading educator and author Van K. Tharp.

Combining the sharp insight and technical...


Implementing Cloud Storage with OpenStack Swift
Implementing Cloud Storage with OpenStack Swift

Design, implement, and successfully manage your own cloud storage cluster using the popular OpenStack Swift software

About This Book

  • Learn about the fundamentals of cloud storage using OpenStack Swift
  • Explore how to install and manage OpenStack Swift along with various hardware and tuning...
Management Strategies for the Cloud Revolution
Management Strategies for the Cloud Revolution

Increase efficiency while saving money with “on-demand” computing

The biggest game-changing force in business since the creation of the Internet, cloud computing simplifies and lowers the cost of operations while providing flexibility and power you never dreamed possible. Make your strategic move now, with...

Google Plus First Look: a tip-packed, comprehensive look at Google+
Google Plus First Look: a tip-packed, comprehensive look at Google+

In four years on Facebook, I gained 453 friends. In four months on Google+, I have 10,141 followers. In the course of this book, you'll learn everything I know about G+ and have a bunch of fun doing it!

At first glance, Google+ (or Plus, the terms are interchangeable) seems awfully familiar. You can make Posts, like on...

©2024 LearnIT (support@pdfchm.net) - Privacy Policy