Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Ethical Hacking

Ethical Hacking

List Price: $74.95
Your Price: $60.14
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Ethical Hacking - A work of Art
Review: "Trojans and Backdoors" and "SQL Injection" were simply astounding. These chapters showed a great insight into the subject and all aspects were explained beautifully.
Probably one of the most under-rated books and is a definete buy for anyone who has an interest in Security.
Any more in the anvil?


Rating: 1 stars
Summary: Poor Grammar and No Point Structure
Review: Do they anything that is less than 1 star?
Like most reviewer that given their comments, here is my comment about the 'course Material'. I am not a native english speaker but I could still identify poor sentence and grammer construction and it could not related the points clearly.

For example in the chapter on evading intrudion detection system. 'Fragrouter evade detection by Network Identication Intrusion'...What are they trying to say?

Use this material just as a guide, read and find out more from better security books. Your examination will use around 20 to 30% of material other than that forget it.



Rating: 3 stars
Summary: CEH 312-50 book
Review: First, I will agree with several of the negative posters. Yes the grammar is horrible, the printing is horr ible and someti mes it is ha rd to rea d, and the some of the tools are outdated. I bought this book to prepare for the exam not to learn about hacking. If you want to learn about hacking buy some of the hacking exposed books. That being said I will talk about the inside of the book. The book covers the modules for the CEH 312-50 exam. I found alot of the information useful but nothing in the book is original in my opinion. I think it was all copied from other sources like the tool's websites or other books. I think that should be noted to anyone thinking about buything the book. Now there are some good chapters in there and I have marked several pages of tools and techniques to go back and play with in the lab but like i said nothing orginial. If you dont want to buy the book to study for the exam the objectives and tools are listed on the website, you can get all the information yourself. Me, I have too much other stuff to do besides putting together a study guide that i can just buy instead. 75 dollars is cheap compared to what the actual course material will cost you on the website or to take a 5 day hacking course. I will post a follow up after the exam to say if the book was helpful are not in preparing for the exam.



Rating: 1 stars
Summary: Ethical Hacking
Review: I can't believe I bought this book! The description of the (mostly outdated) tools are just rip-offs of what you can find just by searching the web and most of the exploits are old. Surely there have to be far better books out there by people who know security. I have a library of IT security books at home and this isn't one of them!

Rating: 2 stars
Summary: Cashing in
Review: It seems to me that the 'EC-Council' are simply trying to cash in on their exam by publishing this book. The testing tools and information is outdated in a lot of places, and the fact that the book is poorly written does not help things.

I recently read and reviewed Network Security Assessment by O'Reilly, which is far more useful as a pentest guide and reference.

Rating: 1 stars
Summary: Not as good as you might think!!
Review: The EC Council has produced a great book!! Well, it doesn't fall apart like some. It's such a shame that the content doesn't match the manufaturing quality.
I have some experience in IT security and I was shocked to discover that some people are still teaching the 'Ping of death'!!!!! That hasn't worked for years. The modules they have structured the book on are not organized and too disparate!

I was really disappointed with the book. I'm going to have to buy another book, a better book.

Such a shame.

Rating: 1 stars
Summary: First impressions count
Review: The EC-Council calls itself a professional organization, but the horrendous grammatical and punctuation errors contained in this book cast serious doubt upon that claim. I found myself wondering if English is the first language of the author(s). Even the printing is awful, as on every page words are interrupted by empty "spa ce." I can't even address the content--I got a headache just trying to get the sentences to make sense, and finally had to give up. If so little attention is given to the presentation of the facts, how much confidence can I have that the facts themselves are correct?

Rating: 1 stars
Summary: Reader From Italy
Review: The EC-Council has a great CUT and Paste method of publishing a book, they don't even list the Author. The tools are old and outdated, and grammar, Well what grammar? How do they certify Ethics? Waste of $75-00.

Rating: 5 stars
Summary: This course material really armors you with knowledge
Review: Well the book is a real kill. There are some technical terms which do not sync with the grammar, but thats ok. When you buy a high end technical book you cannot expect dramatics here!!

EC Council's book has a exhaustive list of tools and are neatly explained. This book coupled with the Intensive classroom training of EC Council really helps in clearing the exam. I would not recommend this book for buyers who simply buy techy books for stocking their library. You need to attend their training which i think is world class. I was one of the fortunate who could find their training centre near my home town.

cheers again


Rating: 5 stars
Summary: Keep things in context. This is courseware.
Review: While the grammer may not meet some's expectations (very few technical tomes make for a good read), you need to keep in mind that this is cirriculum for a VERY technical course of ethical hacking, software exploits, hacking counter mesures, etc.

This book is intended to be used in conjunction with an Instructor-lead training class. It is only part of the courseware. When presented in proper context by a qualified instructor as part of the class, it makes perfect sense.

I would not recommend this book if you are just trying to learn how to hack/crack. However, if you are fortunate enough to be able to attend one of these CEH classes, you will find this book a gold mine of useful, relavent, and accurate information.


<< 1 >>

© 2004, ReviewFocus or its affiliates