Rating:  Summary: Good Security Reference Review: I found this book to be an excellent instructional tool and reference. Each topic seems to start out at the basics but quickly gets into specifics and details. For example, in the case of the NT passwords chapter. I knew a lot of the introductory material already, but found that the author went into such detail that I learned a lot.I choose IT books based on their 'everyday' use and what kind of shelf life they will have. I think this is an excellent book for both. There is a lot of practical information on security tools and techniques that will keep me busy for months. Additionally, the security principles are backed by specific examples. While the examples might age off as new operating systems become popular, the security descriptions will be valid as long as the Internet is around.
Rating:  Summary: Finally, a readable book about network security! Review: I'll be brief. If you are a layman, and you don't have much expertise in the computer security field, then read this book. "Hackers Beware" does assume some prior general knowledge about networking and software, but anybody who's taken a few courses, or had a bit of on-the-job experience will be able to follow along quite well. Even better, if you are a business owner, and are worried about the security of your network (and believe me, you should be), then reading this book will give you the added advantage of being able to communicate intelligently with you network security personnel. Further, after having studied this accessible tome, you will be able to discern as to whether your networking people actually know what they are dealing with (sadly, some don't. You know 'em and I know 'em. Yes, I'm refering to the PAPER MCSE's). Being able to speak intelligently with your employees, and put your heads together in solving the formidible problem of network security, will be of limitless benefit to you. All in all, an understandable, mostly-in-plain-English book that will behoove all who read it.
Rating:  Summary: Finally, a readable book about network security! Review: I'll be brief. If you are a layman, and you don't have much expertise in the computer security field, then read this book. "Hackers Beware" does assume some prior general knowledge about networking and software, but anybody who's taken a few courses, or had a bit of on-the-job experience will be able to follow along quite well. Even better, if you are a business owner, and are worried about the security of your network (and believe me, you should be), then reading this book will give you the added advantage of being able to communicate intelligently with you network security personnel. Further, after having studied this accessible tome, you will be able to discern as to whether your networking people actually know what they are dealing with (sadly, some don't. You know 'em and I know 'em. Yes, I'm refering to the PAPER MCSE's). Being able to speak intelligently with your employees, and put your heads together in solving the formidible problem of network security, will be of limitless benefit to you. All in all, an understandable, mostly-in-plain-English book that will behoove all who read it.
Rating:  Summary: Finally, a readable book about network security! Review: I'll be brief. If you are a layman, and you don't have much expertise in the computer security field, then read this book. "Hackers Beware" does assume some prior general knowledge about networking and software, but anybody who's taken a few courses, or had a bit of on-the-job experience will be able to follow along quite well. Even better, if you are a business owner, and are worried about the security of your network (and believe me, you should be), then reading this book will give you the added advantage of being able to communicate intelligently with you network security personnel. Further, after having studied this accessible tome, you will be able to discern as to whether your networking people actually know what they are dealing with (sadly, some don't. You know 'em and I know 'em. Yes, I'm refering to the PAPER MCSE's). Being able to speak intelligently with your employees, and put your heads together in solving the formidible problem of network security, will be of limitless benefit to you. All in all, an understandable, mostly-in-plain-English book that will behoove all who read it.
Rating:  Summary: Excellent Book Review: I've have the fortunate opportunity to be in a SANS course taught by Eric, and I found him to be an excellent teacher and very knowledgeable in the security field. This book covers more that he could ever cover in a 4 day course (and that was a lot!). I have found it to be great reference book and one that is hard to put down. I doubt it will ever collect dust! Good on you Eric!
Rating:  Summary: A truly comprehensive text on hacking techniques and defense Review: Let me first begin by stating that if you ever get the opportunity to take one of Eric Cole's classes, you are in for a real treat. He is an instructor for SANS, and I was fortunate enough to take his Incident Handling and Hacker Exploits class. His course material and teaching style is great, and if ever you are able to take a class of his by all means do so. Now on to his book. Eric does an excellent job of not only demonstrating the newest hacking exploits, he does even a better job of demonstrating the methodology of the hacker mindset. In addition, his text explains how to defend yourself against these exploits. This is an excellent resource for computer and network security, not only because of the many illustrated hacking techniques, but more so because after reading you will be able to think like a hacker. Both his class and his book demonstrate that Eric is very knowledgeable in hacking and defense. The best aspect of the book in my opinion is the fact that when he covers an exploit, he covers it in full-disclosed detail. The chapter on the SANS Top 10 Exploits is excellent, as it describes what exploits must be fixed for any organization that is connected to the Internet. All in all this is one of the best hacking books I’ve ever read. This is an excellent book for any potential reader who is looking for a text which gives an overall viewpoint of hacking, hacking techniques, and defending against hacks.
Rating:  Summary: Comprehensive Network Security for your Businesses Survival Review: Network owners, administrators and personnel will find that Hackers Beware is the first network security book that integrates each of their usually divergent concerns with the explicit network security practice solutions necessary for business survival. Mr. Cole's book is the most well written compendium of network security practices and pitfalls published and provides specific security solutions for any platform you may be using. Anyone in any field that is concerned with network security will find that Hackers Beware becomes one of their most useful desktop references.
Rating:  Summary: EXPOSED ? Review: The content of this book is slightly like EXPOSED. The tools covered is better (I guess). But the thing differs with exposed is that there is icons like "no entry" in exposed books. Table of Contents : 1 Introduction 2 How and Why Hackers Do It 3 Information Gathering 4 Spoofing 5 Session Hijacking 6 Denial of Service Attacks 7 Buffer Overflow Attacks 8 Password Security 9 Microsoft NT Password Crackers 10 UNIX Password Crackers 11 Fundamentals of Microsoft NT 12 Specific Exploits for NT 13 Fundamentals of UNIX 14 Specific Exploits for UNIX 15 Preserving Access 16 Covering the Tracks 17 Other Types of Attacks 18 SANS Top 10 19 Putting It All Together 20 Summary A: References Index
Rating:  Summary: Hacking Exposed...expanded ! Review: There are four main kinds of computer security books: 1) Books containing large enumerations of known vulnerabilities and attacks. 2) Books covering the theoretical related aspects. 3) Books on computer forensic areas. 4) Some kind of hybrids of two or more of the above. 'Hackers Beware' is a well balanced hybrid of 1) and 2) categories. I think of it as a sort of Hacking Exposed (the book) enriched with theoretical background and detailed explanations. In the plus side, this book offers: - Well structured by kind of attacks and by kind of Operating Systems. - Well written chapters on Fundamentals of Unix and NT. - The author, a recognized specialist and SANS' high rated instructor. - Full of well documented analysis of relevant exploits. - Discussions (although short) about 'Rootkits', 'Buffer Overflows' and 'Covering the Tracks'. - Chapter 17, 'Other Types of Attack', specially for the PGP ADK Exploit presentation. In the minus side: - As a book relaying on 'current' exploits, it could easily be short-lived. If future additional editions are scheduled (a la Hacking Exposed)...OK, else ...Beware! - Chapter 18, can be found (updated) in the Internet. Chapters 19 and 20 are just fillers. I use this book mainly as a reference book for my (undergraduate) students.
Rating:  Summary: A great Reference Guide Review: There are many books out that claim to be about information security. I have found that 90 percent of them are outdated and on useless topics. Hackers Beware was a rare treat. The information that Mr. Cole explained was not only up to date, but was relevant to my profession as a security engineer. His no holds barred approach gave a real insight into how hackers think and act. The book is written in a way that allows administrators and security professionals to actually utilize the information provided. I look forward to more books by Mr. Cole.
|