Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit |
List Price: $59.99
Your Price: $37.79 |
 |
|
|
Product Info |
Reviews |
Rating:  Summary: Essential to Security Library Review: Very good technical book on Hack Attacks. There is so much information that I have not had time to fully read the book! I do believe this book is essential for your security library.
Rating:  Summary: i can't put this book down Review: i just got my copy and can't put it down. this is the best book on hacking. it shows you what hacks look like with steps and diagrams.
Rating:  Summary: great material Review: great material to get learning on how to hack to better secure your clients networks. there are many advanced steps and hacks as well for the more technical engineer. tiger tools are the best ive seen so far.
Rating:  Summary: Hack Attacks Revealed Review: John cuts right to the mustard...no garbage to get in the way of the learning process. This book has helped be make my customers networks more secure. I'm looking forward to his next book.
Rating:  Summary: Awesome Defence Review: This book is the last word in defence against hackers, it starts from the very basics and carries onto fairly complicated methods that hackers use to attack your network. Well recommended.
Rating:  Summary: Useful Review: It's on my desk since i got it. Useful reference and tools, security isn't a matter for ignorant people, it's a new border within the new frontier.
Rating:  Summary: This Book is a must have! Review: I still can't believe they let John publish this book.Try his techniques at your own risk, Because the majority of them are VERY illegal. Nuff said of that! I've been reading John's book for over a month now. Not that I'm a slow reader, but his book is more the size of an encyclopedia. Not only does John show exactly how networks and the internet connects. He also Shows the actual penetration techniques hackers use. Then he goes one step further. John gives you a whole disk of software to try out. If you are really serious about breaking into er,<cough>I mean protecting your system from hackers then this is the only book you will need to read. This book coupled with a full support forum and John's always-prompt responses to email, makes this book invaluable to anyone connected to a network, or even the internet. James P
Rating:  Summary: Absolutely Unique Approach Review: I have never seen, heard, learned, used and played with such a product. It could let you dig down very deep, however, you would never realize how deep you come down. I bought it because I thought I would learn what does typical hacker does. Now, I want to be a hacker and say hello to my friends company's intranet.
Rating:  Summary: Extremely rewarding to invaluable Review: After reading the book in it's entirety, and having the opportunity to use the tools, this material has become a part of my technical repertoire. The author does an excellent job of peering into the mind of the hacker, and pulling out the necessary portions to make a security professional more effective. The "tricks" (for example social engineering) are real world examples that I have encountered personally. If you read between the lines, and think of how to stop some of these threats before the happen, you will come to the same conclusion. I highly recommend adding this book to your library.
Rating:  Summary: Hack Attacks Revealed Review: This is a great book full of information explaining how to's. and showed to you on a windows platform where most others deal with unix or linux as a hacking box. I recommaned this book to anybody woorking on or setting up networks!!!!!
|
|
|
|