Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 8 9 10 11 12 13 14 .. 27 >>

Rating: 4 stars
Summary: No...Hype Just the Facts
Review: H-A-R is a well constructed piece of work. John went all out to bring us some of the latest techniques used by today's attackers. As for the CD, don't take anyone's word, you have to test it out for yourself. The CD alone is worth more than the price of admission. Enough said...This is a Keeper.

Rating: 4 stars
Summary: Lots of code
Review: I found this offering to be unique in that it provided many examples of actual code to illustrate the techniques. It was sort of like being able to watch the gears in motion while reading about an exploit. I also found that the style of writing was much deeper into the mechanics of attack/defense while letting the code display the method. This was a very good counterpoint to the usual "how-to" book that talks about the exploit. All in all, a worthwhile read and good shelf reference.

Rating: 5 stars
Summary: Most informative
Review: This book contains information for all levels of understanding. As a curious small business owner, I felt a need to be informed as to what tools hackers might be using to affect my server. I found that this book was more comprehensive than anything I've found to date.
Highly recommended.....the software is excellent as well.

Rating: 5 stars
Summary: Information Overload
Review: I thoroughly enjoyed reading this book. I now fully understand how certain exploits actually work, and now, how to prevent them. Being relatively new to the C programming language, I found the chapter on C fundamentals more informative than some books that are devoted to this topic. Good stuff.

Rating: 5 stars
Summary: Amazing book
Review: This book is the best network security book I have ever used. It is so good that I have a copy at home and a copy in my library at my office. A must for anyone who takes network security seriously.

Rating: 5 stars
Summary: The Best Hacking Techniques Book So Far
Review: I have seen a number of "hacking" books over the last 10 years, but none of them come up to this standard. For a security professional responsible for major Internet connected networks, it is essential reading in order that you have an in depth techie knowledge of how the other guys do it.

This book is an absolute "must have" in your security toolbox, and the Tiger Suite tools are a real bonus. The included CD with its essential links and tool sets make this a book that I can whole heartedly recommend to you all.

Rating: 4 stars
Summary: Solid Book on Network Security
Review: The book is chock full of exploits, code, and scripts with many diagrams and figures. It doesn't go into great detail on how the exploits work from the perspective of breaking down the code, programs, and services that the hacks exploit. That, however, is not the function of the book and could be several books worth of highly technical material in themselves.

The attached CD is one of the best parts of the book. It's contains code used through the book. There is also the Tiger Tools suite. You can buy an upgrade from Tiger Tools to the Full Version of the Tiger suite for cheap.

Rating: 4 stars
Summary: Useful Info & Tools
Review: Mr. Chirillo's book is a good source of info for those new to security attacks and prevention. The book gives you ideas on what to look at on your network and discusses tools to examine them.

I have used the toolkit on our network and found liked the tools enough to buy the professional upgrade.

On the downside, some of the tools aren't functional in the current professional release.

Rating: 4 stars
Summary: Know your enemy and make him your friend
Review: Setting up security without knowing what your guarding against is like fishing without knowing what your fishing for. When you know the tendencies of the fish(Hacker) it's lot easier to know what bait(security) to use. Consider this book the fishing bible of Hacking.

Rating: 5 stars
Summary: A MUST READ
Review: This is a must read for anyone interested in learning about the "dark side", but also wanting to obtain the technical knowledge of networking. From the aspect of a systems admin (NT and Solaris), this is a book that has been a critically important resource of information. It's easy to read, and interesting. It was almost like reading a spy novel. I look forward to the next edition.


<< 1 .. 8 9 10 11 12 13 14 .. 27 >>

© 2004, ReviewFocus or its affiliates