Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition

List Price: $49.99
Your Price: $32.99
Product Info Reviews

<< 1 2 3 4 5 6 7 8 >>

Rating: 5 stars
Summary: A must-have...
Review: For the security-minded professional, this book is a MUST HAVE... any security collection is simply not complete without this easy-to-use, well-written reference. Though typically not enough information for script-kiddies and the like, it's enough for the security engineer type to quickly and easily identify problems and come up with ways to fix them in their environments.

Rating: 5 stars
Summary: great humour
Review: whatever you use its in here, its a bit short on wireless and xp (the latest ms os release when written) but it covers unix and microsoft.

it covers the theoretical as well as the known bugs. Asks important questions. The lession learned are patch - dont use microsoft, and configure it properly to begin with.

Rating: 4 stars
Summary: I almost feel like a hacker!
Review: This book was good, it gave some decent information and pretty much covered NetBios hacking. This book also gives you links and tips on how to hack and possibley not get caught. I learned some good Footprinting from this book, and I recommend it to a "newbie" or someone who is a script kiddie.

Rating: 4 stars
Summary: Too shallow wireless section.
Review: I bought this third edition, mostly because of the claims about covering wireless security area. Well, as it turned out, this 'coverage' includes just three lousy pages !!
The book is very like the second edition. No relevant changes are presented, and therefore several issues are now dated.
If you don't already own the second edition, then buy this new third edition, overall, it is a quite comprehensive and useful book. However, if you are looking for a serious wireless security treatment, then you should better try books like ' Hack Proofing Your Wireless Network' or alike.

Rating: 4 stars
Summary: Heavy but effective
Review: I wasn't quite sure what I was letting myself into with 'Hacking Exposed'. In fact, I'm not even sure why I bought it - curiosity, I suppose. Being reasonably computer literate, I expected to find stuff that I might quickly understand. Sadly for me, I guess I'm not as computer savvy as I thought since about 70% of the content went way over my head. That's not the book's fault, since it is well laid out, well thought out and well presented.

Maybe what got me in the end was the SUID shell... [tsuiami}$ echo "/bin/cp /bin/sh /tmp/.sh ; /bin/chmod 4755 / tmp/ .sh" /etc/rc.d/rc3.d/s99local (page 369)

Any/clues/anyone? I'm;well;lost!

Certainly, for anyone who's in touch with 'real' programming, at least 'Hacking' talks about security from an offensive angle. A full catalog of the weaponry that black-hat hackers use is laid out in its full gore.

Rating: 5 stars
Summary: exceptional book
Review: This is an exceptional book. It is technical enough for technicians to attempt play hacker and demonstrate why vulnerabilities are actually an issue to the non-technical staff.

I highly recommend everyone who wants to work in the Computer security field get and read this book. BTW, only attempt these tips and tricks on networks you have permission to attack. This book doesn't cover the legal issues that come from attacking a network.

Rating: 5 stars
Summary: Excellent Book
Review: I feel all IT people should read this book! I learned tons of stuff about hacking and how to guard my systems!

Rating: 3 stars
Summary: Not for beginners
Review: I like the rating system the book uses for the individual types of hacks. It gives the reader an idea of the damage and how easy it is execute a particular hack. If you're looking for a beginners guide to explain hacking at a higher level, suggest you keep looking.

Rating: 4 stars
Summary: A Must Have for any administrator's bookshelf
Review: I came into this book with little knowledge of hacking methods, outside of what I had read in some other books. Boy were my eyes opened! Not only did I find out how simple things I take for granted and use often can be used maliciously, but how much is out there designed to do harm to me. Some quibble that this is tantamount to a "how to" guide for wannabe hackers, but it's important for someone like me to know the tools and be able to act preemptively against potential hackers. The book is exhaustive and greatly epxanded from the first edition. Thought I skipped a lot of things that weren't directly related to my systems or experiences, I have found myself grabbing the book again and again to look something up, or to explore how something works so I can try to avoid it.

This book, as well as the recent worms and viruses, should serve as a wake up call for anyone who deals with networked computers, from the system administrator to the home user with an exposed system on a cable modem. Probably one of the scariest books I've read in a long time. It may not keep you reading like Stephen King, but it's just as scary and proves, what you don't know *CAN* hurt you.

Rating: 5 stars
Summary: Great book....
Review: I thoroughly enjoyed this book. It will not turn the average computer user into a true hacker but it gives you a good understanding of the many vulnerabilities that exist in todays systems.

The layout of the book is excellent. It follows in the logical order in which an attacker would go about his/her work. It starts with generic information gathering and then divides into exploits by OS. It covers the use of a very large number of tools (would be nice if they were included in a CD) as well as an explaination their strengths.

This book is definitely helpful to the intermediate/advanced user who is connected to the internet via DSL/cable modem. By explaining how computers are hacked, users have a better idea of what to do to their own computers to keep hackers out. It can also make you paranoid so read at your own risk.


<< 1 2 3 4 5 6 7 8 >>

© 2004, ReviewFocus or its affiliates