[Verdict]:
This book is the first book in the series "Stealing the Network" books. It's a cybersecurity fiction book about the world of hacking written in a format of a novel but with accurate and real technical content to satisfy any security geek or engineer.
The book has been written by multiple authors who are credible and distinguished names in the world of Cyber Security. Several independent stories each describing a different scenario involving a different type of hack.
What makes this book so interesting and different is the fact that each of these scenarios although fictional, are very plausible and the techniques and tools described to carry out those attacks are real. From the story of the disgruntled employee who is out for revenge on his employer, to the paid hacker who stole a valuable piece of Intellectual Property for a competing company.
Even as a seasoned security professional, I had a tingling in my spine reading some sections thinking, genius! But wait...that could happen to us if we don't review x,y,z in depth.
Although the book is dated and some of the tools or techniques described might not be up to date, it is still a great reference for the methodology and mindset. I have learnt a lot from this book from the perspective of an attacker. The style is so engaging and well written. If you are not technically inclined, you won't miss a thing by skipping the commands and various instructions or outputs of the hack. You should be able to enjoy it as a cyber-thriller. The end of the book contains a handy summary and a chapter on the laws of Security which explain how to best protect yourself and your company against most of the attacks described in the book.
[How I read this book]:
I have had this book for a while at my desk in the office. I was juggling other books but I finally decided to do a fun challenge to start reading it. Every morning while my laptop boots and my email and other programs load, I get a solid 5-10 minutes which I used to use to chit chat with my colleagues or get some coffee. I have replaced it with reading 5-10 pages a day while my laptop fully starts up. This gives me the chance to digest the hack and gets my brain working throughout the day in how I would have done it, try the hacks myself or how I would have secured my systems against it. Much better than whizzing through the book and not grasping the message they are trying to communicate.
Through the power of small steps and chipping away at this, I have finally managed to finish this book! I have already ordered the next two books in the series and plan to read them in the same style without sacrificing extra time after work as I am reading other books.