- Save 10% on Books for Schools offered by Amazon.co.uk when you purchase 10 or more of the same book. Here's how (terms and conditions apply) Enter code SCHOOLS2016 at checkout. Here's how (terms and conditions apply)
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks Paperback – 25 Apr 2005
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
Special Offers and Product Promotions
Frequently Bought Together
Customers Who Bought This Item Also Bought
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
The book is full of amazingly clever attacks, but explained in a way that makes all the concepts completely clear. Early on for example, the author spends several pages explaining how to build up a computer processor (in wood, should one desire) in order to explain a series of ingenious ways of recovering information, such as code keys, by looking at how long processing them takes. Later he explains the basic protocols that make up the internet, in order to show how much information is placed, unintentionally, on the wire.
Michal Zalewski's love for this strange world of background noise and broken messages is self evident, and his wit and humour lend the book a relaxed air. Still, there is hardly any filler and I think it would be very hard to come away without having your mind opened, at least slightly, to the vast sea of information that there for anyone inquisitive enough to listen.
Silence on the wire is an awesome book, clearly targeted for security enthusiasts. In its 18 chapters, it shows many different (and often undetectable) ways in which an attacker can obtain useful information just by watching the way your systems behave. Did you know that in some cases it's possible to determine an attacker's system clock time that is port-scanning one of your boxes? Did you know that there are ways to identify decoys and spoofed packets? Or that you can recover the information being transmitted by a modem just by observing its LEDs? Reading the book you may find that your Ethernet card is leaking kernel-space information, that your system's pseudo-random-number-generator is not that random but totally predictable or that someone is remotely port-scanning your server while all you can see are incoming TCP SYN packets coming from a trusted box.
Every chapter starts with an introduction, then discusses one or more attack vectors and finally gives some "food for thought", this is, ideas for further research or further paranoia. Sometimes those introductions are longer than they should but at the same time they provide the background required to understand what comes next. For every chapter, the book also includes a list of references to relevant papers, specifications or research projects.
It is true that the book is 5 years old, but believe me, I didn't find a single line that was outdated.Read more ›
It's a real 5 STARS book! Worth the time and money - but don't forget to read the first few chapters to get in the right mood, even if those chapters will seem to be too technical... Believe me, they are not :-)
What it definitely will do is lead anyone with an interest in computing and electronics on an detailed tour of how the technology we use can be manipulated from a very low level. I am not a mathematician or an electronics engineer so I found the topics quite complex but they are very well explained.
Most Recent Customer Reviews
I can't recommend this book enough. So many of the IT-related books out there are half hearted affairs which do nothing more than paraphrase existing documentation, but SOTW is a... Read morePublished on 31 Aug. 2007 by P
Look for similar items by category
- Books > Computing & Internet > Computer Science > Information Systems
- Books > Computing & Internet > Digital Lifestyle > Online Shopping > Amazon
- Books > Computing & Internet > Networking & Security > Network Topics
- Books > Computing & Internet > Networking & Security > Security
- Books > Computing & Internet > Programming > Interface Design