Rating:  Summary: A good reader! This book is extremly interesting, Review: This book is extremly interesting, personally I think anyone that uses computers can learn quite a bit from reading this book. I think that it is good enough to be used as a textbook for college classes for information and projects. I learned a lot about computer security, and keeping my computer safe from reading this book. The only thing I did not like was this. The book constantly refers to their web site for examples and programs, most computer science or computer tech. book usually have an accompaning CD rom that comes with the book, this book does not come with such a CD rom, if you want that you have to buy it from the web site for another small some of money. otherwise I would have given this book 5 stars, but overall it is extremly interesting.
Rating:  Summary: Great Book Review: This book is great for hackers and administrators it teaches everything you need to know for basics and more advanced. It shows you how to think like a hacker. Even though you already know something in this book you will even know more about the subject and find things about what you thought you knew that are amazing.
Rating:  Summary: More like a collection of CERT advisories. Review: This book is a good introduction to script kiddies, programmers who want to know about tools to attack systems and novice system administrators. It is a compendium of most of the attacks known. I did not like the way the attacks are classified according to the operating system rather than based on the bugs involved. For each attack mentioned in the book, they describe the tools needed to carry out the attack, a high level description of the attack strategy using the tools and ways to protect against the attack. However the book fails to explain the flaws in the protocols or programs that allow these attacks. I would recommend this book to someone who doesn't care how an attack works, but is just interested in knowing about various attacks. Definitely not recommended for someone working in this area or someone with basic OS knowlege.
Rating:  Summary: Not what I had expected Review: This book didn't teach me anything I didn't already know. I guess I should have read the title before I bought the book. I was expecting Computer security auditing 102 and got Hax0r1ng ExP0sed: your 800 page ub3r l33t guide to take you half way to script kiddie! I'm not saying that this book doesn't have any decent information, I am just saying that it's not for the guru. I could rewrite this entire book in fewer than 40 pages.
Rating:  Summary: A *MUST-HAVE* for all Network/System Administrator Review: This is THE book to have about security... The authors tell it as it is, no B.S. You have access to the tools real hackers use and to the knowledge they all share... This is probably the best computer book I've ever bought... It explains in details how to footprint, scan, use backdoors, social engineering... In one word: A-M-A-Z-I-N-G!
Rating:  Summary: Excellent overview of hacking methodology Review: Superb book on the methodology of hacking. It is more important to understand the way hackers think, then to rely on security tools that come and go. There will always be new and better tools. Great resource on many different topics, researching your target, OS vulnerabilities, network security, internet user security, and much more.
Rating:  Summary: Good book -- but for CISSP?? Review: This is no doubt a great book. I initially bought this book, the information security handbook and practice exam ... to study for CISSP exam. While the material of this book was generally out of scope for the exam, it was without a doubt still a great book -- it just was more technical than the exam, whereas, the exam was just VERY broad. If your looking to pass the CISSP, don't rely on this book, but if you want a GREAT book about "hacking" then get this!!
Rating:  Summary: Hacking Exposed, 2nd Edition Review: SUPERB This book is just as good if not better than the 1st edition. This book is what sys admins have needed for years and now they have it. The 2nd Edition is not just a few more exploits and info with a new cover it is a whole new book! yes some of the content is still the same but that is because that exploit of bit of information is still valid, if you got the first one and feel it was a big help (which think 99% of people who got it thought) then i would HIGHLY recommand getting the 2nd edition. Only bad part was no cd! Where is it? I know you can buy it from them but i think it should come with the book and they put the rpice up ... or something! Other than that great book, well needed by everyone! *about me: i am ... from London UK, you can work out the rest ;)
Rating:  Summary: Finally Review: Finally a book written by a Scambray that is worth a darn. Within the immediate family there are no less than six english majors over the past two generations. The first attempt at a publication was an academic endeavor on the behalf of one Kenneth Scambray. A nice try but not what you would call a best seller. Something about farming. "A Varied Harvest" I am not a computer specialist but from the feedback from our IS department within my company this book is great. Congratulation Joel, we are all proud of you. Carol, Linda, Kara, and Terry need to get to work. Look for Kenneth's second try. I think he had to switch to Italian to go for a larger audience.
Rating:  Summary: Impressive follow-up edition Review: I read the first edition and thought it was a great book that every administrator should have. I didn't think that they would come out with a second edition so quickly. I am impressed that the second edition isn't just a rehash of the same material. It is filled with new information that is a must have for security minded administrators. The application hacking information is the wave of the future. We have had consultants come in to perform work for our company who have carried the first edition in hand to perform security reviews for us. I can't wait to see how long it takes them to bring in the second edition. Its amazing how the authors share this great information with their competitors. The authors are keeping the competition on their toes and increasing the general knowledge of security for the whole industry. Keep it coming guys!
|