Rating:  Summary: No...Hype Just the Facts Review: H-A-R is a well constructed piece of work. John went all out to bring us some of the latest techniques used by today's attackers. As for the CD, don't take anyone's word, you have to test it out for yourself. The CD alone is worth more than the price of admission. Enough said...This is a Keeper.
Rating:  Summary: Lots of code Review: I found this offering to be unique in that it provided many examples of actual code to illustrate the techniques. It was sort of like being able to watch the gears in motion while reading about an exploit. I also found that the style of writing was much deeper into the mechanics of attack/defense while letting the code display the method. This was a very good counterpoint to the usual "how-to" book that talks about the exploit. All in all, a worthwhile read and good shelf reference.
Rating:  Summary: Most informative Review: This book contains information for all levels of understanding. As a curious small business owner, I felt a need to be informed as to what tools hackers might be using to affect my server. I found that this book was more comprehensive than anything I've found to date. Highly recommended.....the software is excellent as well.
Rating:  Summary: Information Overload Review: I thoroughly enjoyed reading this book. I now fully understand how certain exploits actually work, and now, how to prevent them. Being relatively new to the C programming language, I found the chapter on C fundamentals more informative than some books that are devoted to this topic. Good stuff.
Rating:  Summary: Amazing book Review: This book is the best network security book I have ever used. It is so good that I have a copy at home and a copy in my library at my office. A must for anyone who takes network security seriously.
Rating:  Summary: The Best Hacking Techniques Book So Far Review: I have seen a number of "hacking" books over the last 10 years, but none of them come up to this standard. For a security professional responsible for major Internet connected networks, it is essential reading in order that you have an in depth techie knowledge of how the other guys do it.This book is an absolute "must have" in your security toolbox, and the Tiger Suite tools are a real bonus. The included CD with its essential links and tool sets make this a book that I can whole heartedly recommend to you all.
Rating:  Summary: Solid Book on Network Security Review: The book is chock full of exploits, code, and scripts with many diagrams and figures. It doesn't go into great detail on how the exploits work from the perspective of breaking down the code, programs, and services that the hacks exploit. That, however, is not the function of the book and could be several books worth of highly technical material in themselves. The attached CD is one of the best parts of the book. It's contains code used through the book. There is also the Tiger Tools suite. You can buy an upgrade from Tiger Tools to the Full Version of the Tiger suite for cheap.
Rating:  Summary: Useful Info & Tools Review: Mr. Chirillo's book is a good source of info for those new to security attacks and prevention. The book gives you ideas on what to look at on your network and discusses tools to examine them. I have used the toolkit on our network and found liked the tools enough to buy the professional upgrade. On the downside, some of the tools aren't functional in the current professional release.
Rating:  Summary: Know your enemy and make him your friend Review: Setting up security without knowing what your guarding against is like fishing without knowing what your fishing for. When you know the tendencies of the fish(Hacker) it's lot easier to know what bait(security) to use. Consider this book the fishing bible of Hacking.
Rating:  Summary: A MUST READ Review: This is a must read for anyone interested in learning about the "dark side", but also wanting to obtain the technical knowledge of networking. From the aspect of a systems admin (NT and Solaris), this is a book that has been a critically important resource of information. It's easy to read, and interesting. It was almost like reading a spy novel. I look forward to the next edition.
|