Rating:  Summary: Better and most useful Review: "Secrets and Lies" by Bruce Schneier taught me that computer security is much more than building better firewalls and managing them well. "Hacking Exposed" showed me what that means in practice. Scambray and McClure have all the knowledge and tools to look at the front door of the network, but also know that most hacks come through social engineering, unguarded other entrances, email delivered trojans, and other techniques that bypass the firewall entirely. That's the real world, and they treat it with gusto, vibrancy, and deep understanding. Most computer books are "just the faqs" dumps of the subject, with a little organization. These guys put you right inthe middle of things, and their knowledge clearly comes from intense practice, not theory. Dave Burstein
Rating:  Summary: ANYTHING EXCEPT 5 STARS IS UNFAIR. Review: Guys! This is a starter book. Get real! -(1)- Many readers complain that it does not have enough detail (Specific and new hacks, deep description of protocols, for example). But this piece was not written for this. You can't blame a chicken for not giving you milk. This is an overview book, which can't cover everything physically, it is thick enough already, giving a very good general notion of the field. -(2)- Same readers take stars from the book for "containing only links, not much else". But that's the point! Just follow references, they are very useful. It is the only way to find fresh and profound material. Guys, who expect to find everything in one book are just lazy and unprofessional people, who bought it to play around with neighbour's PC or some box on the web. -(3)- "I bought the book, but it turned out to be useless :( ". Shure it did. You didn't check table of contents and reviews. But that's not the author's fault, don't take off stars.
Rating:  Summary: A good start for those interested in Computer Security. Review: I work for a major government contract in the DC area which supports over 100,000 internet/email users. We have a highly secure network with multiple firewalls, etc. This book will not really help you secure a network but it will give you a good background on theory for detection of potential attacks. Since it is relatively cheap, I suggest that this book be added to your collection if you are pondering getting into computer security.
Rating:  Summary: Truly An Excelent Book Review: This book is very useful a must have to all network administrators or people who just want to secure there pc. Before I had this book I thought my pc was secure enough from intruders but when I read the book I found out how unsecure I really was. You may think your safe from intruders but guess what your not so read this book and see how safe your pc will test out to be!
Rating:  Summary: Some People Being To Harsh Review: As a sysadmin and fan of hacking around with comps in general. This book is excellent for relative newbies to the security field. If you want detailed descriptions of theory and such, get some more scientific books. But if you want real-world applicable information this book is about as good a book as any to start with. Some of the attacks are dated, and it doesn't go into real technical detail. But if you are looking for a how-to guide on how to find protocol and application bugs. You are nothing more than a script-kiddie who wants to be able to write his/her own apps. That type of information doesn't exist, you get it from hacking around and learning it on your own. However this will give you good places to start researching how others scripts work. (Esp *nix versions, since they usually come as uncompiled C code *woot*).
Rating:  Summary: Linux exposed was much better Review: I like the other exposed book much better. This book contains too many outdated hacks and again very little detail.
Rating:  Summary: Whhheeerrreeesss The BEEF? Review: i have been in the comminications field for 13 years now. this book reviewed like it was one of the best out there for hacking methods and vulnerabilities and i thought it would compliment my library. after going through about a third of the book, i now know it is poor. this book is nothing more than a internet directory listing for hack sites and software. it gives no detail at all. it explains next to nothing. where as i was looking for actual mechanics for attacks, to include protocols and logic, this book simply references web site, after site, after site. i would not even recommend this book for a beginner due to no depth. you could do better pointing your browser to the internet than read this book (well, the book does pretty much tell you to go to the internet). look elsewhere, even if you are looking for a starter book on the topic.
Rating:  Summary: Where's the detail? Review: Would be much better if organized properly. Some very cool techniques I wasn't aware of, but too little detail.
Rating:  Summary: Good for reference, but... Review: This book definitely contains a lot of useful information. Unfortunately, it could be organized better, and doesn't go into enough details about the concepts. It is very focused on the use of publicly available tools and information. That said, I still use it as a reference book for specific pieces of vulnerability information.
Rating:  Summary: Great for sys admin Review: Yes this book covers a lot. It shows you how to hack and what tools do you need. Be prepared to spend many hours reading and testing, just likes hackers do :) If you are not willing to invest many hours, stick to web site security alert and apply the patches... py
|