Rating:  Summary: Get a Copy of this Book Review: In this day and age, attacks against companies' internal networks are always a threat and virtually any business, government, or educational institution needs to protect itself against this threat. Firewalls offer an excellent protection against such attacks-but it's just not enough.This new reference offers a lot of information even about veteran techniques. It describes different types of attacks, the tools (both software & hardware), and Internet services (World Wide Web, electronic mail and netnews, FTP, telnet, etc). There's a lot of good common-sense information in here too, when it talks about how you go about deciding what you should and shouldn't do. I learned quite a bit from this book and anyone who needs to learn about security, even if you have no experience, should get a copy of this book if they already haven't. Also recommended: Hack Attacks Denied, Hacking Exposed (2nd)
Rating:  Summary: I recommend this book - a WORTHY ADDITION Review: I read the reviews and purchased this book too. I think this book is a good introduction to hacking, a solid security reference and a great learning tool. There's something for everyone in here. I have been employed as a security engineer for 2 years now, a networking engineer for 5 years and an administrator for 3 years prior. Don't take this the wrong way, I don't claim to be a guru by any means. I simply don't understand the points of some of these reviews. I haven't noticed an abundance of typos or mis-spellings and I cannot see how this book would be difficult to follow, comprehend or utilize. Furthermore, the scripts seem to compile for me, the software on the CD works well on my Windows systems and it's obvious that the book should have old vulnerabilities alongside new ones to be considered a reference. I upgraded the TigerSuite software to version 2.0 to fully expand the powerful features and support the Tiger Town idea for me to test my security skills on different soft/hardware. I've asked numerous coworkers to look at the text and we all agree that Hack Attacks Revealed is a WORTHY ADDITION to our libraries. You'll learn something new just by skimming a few chapters. I recommend this guide to anyone interested in network security and Internet hacking.
Rating:  Summary: Takes too much to say too little Review: I really don't understand this book. The author takes too much time to say too little discerning information. Go with other books, this simply is too expensive and of too little value.
Rating:  Summary: A fascinating and unique view of security topics Review: Hack Attacks Revealed presents highly complex information in a relaxed, informal manner to allow for ease of understanding and application. Sample configurations and illustrations are integrated throughout the book with the intent to show what security can be managed, explain hacking specifics, and instruct on alternative methods. A comprehensive analysis of protocols, communication pathways, and all the technologies in-between, the book's primary focus always circles back to the understanding and deployment of these-a unique approach of this subject today. In-between almost every part there's interesting intermissions as views from a hacker's past, present, and future. The entertainment and humor kept me yearning for more-yes I'm guilty, I did flip through and read them all before the actual subject matter. The CD in the back of the book is literally packed with coding, scripts, links to almost every known Internet security resource, tools, exploits, and a very neat hacking toolbox named Tigersuite. The companion website is an equally excellent resource for news, support, and a new project-Tiger Town for testing your hacking abilities and security implementations for FREE. I have heard some comments from people saying that the book is much too complex for the average person. This is not the case at all, the sections are explained in a very straightforward manner and information that is presented earlier in the book is used later in the book to explain new concepts. I found that I was able to quite easily keep in mind the previous examples when new ones were introduced-the book is so well written and very interesting. The author, John Chirillo, is a Senior Internetworking Engineer with many years of experience in the networking industry. He's been responsible for designing, implementing, securing, and troubleshooting network solutions for several large fortune 500/1000 customers.
Rating:  Summary: Good Book - but not quite what I 've expected Review: This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss. There are some good ones, in the beginning and at the very end, but the ones in the middle simply reprint names and usage of trojan/worm/virus kit software found on the net. Besides not being a complete list is useless since needs to be updated in a daily bases. The good chapters explain you a lot of the protocols and how they interact, common techniques used by intruders. If you do not have any other security/tcp-ip related book you should buy this since it's a good start. If you already have others you can safely skip this one.
Rating:  Summary: Know the Enemy Review: For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.
Rating:  Summary: Not all that useful for security professionals Review: If you are a security professional, then this book is not for you. Its content is too scattered.
Rating:  Summary: NO, NO, NO ! ! ! Review: Dated, boring, with a lot of repetitions, and full of almost useless information. If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack Proofing Your Network (2nd Edition)', quite up to date and comprehensive.
Rating:  Summary: Very poorly written, much redundant information Review: This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained within.
Rating:  Summary: Good thing it was 40% off Review: Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. The basics aren't explained simply enough for a layman, and the experienced engineer already knows the basics--like how many bits in different classes of IP addresses. Secondly, most people who are going to buy this are network security experts, so why the pages and pages of C code and other basics like port numbers, etc? What a waste of time.
|