Synopses & Reviews
Unfortunately, the prospect of evil forces unleashing an all out cyber-terrorism attack on the civilized world is no longer just a bad dream. There are now forces at work with the motive and the means to cripple the Internet, arguably, all they need now is the opportunity. This work of fiction is written by some of the leading security and counter-terrorism experts in the world today, and it outlines a plot to "own the box" on a truly global scale by compromising an entire continent's network infrastructure. The authors bring to life a scary cast of characters and set them on a course of imminent cyber-attack, shedding light on some of the most lethal hacks yet imagined. In-the-know readers will recognize the technologies, scenarios, and threatened intrusions. The first book in the "Stealing the Network" series was called a "blockbuster" by Wired magazine, a "refreshing change from more traditional computer books" by Slashdot.org, and "an entertaining and informative look at the weapons and tactics employed by those who attack and defend digital systems" by Amazon.com. This follow-on book once again combines a set of fictional stories with real technology to show readers the danger that lurks in the shadows of the information security industry... Could hackers take over a continent?
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world