Rating:  Summary: Net Admins - Time to change your hat to that of a hacker.... Review: This book is a good insight for those that need to gain an understanding of principles and methods at an easy to medium level. The hardened reader will have covered these topics in many other books. However, the perspective is now that of a hacker and not of the Net Admin. Lots of info covering the various approaches used by hackers, some of which my team were oblivious to! The Tiger Suite toolset is very useful in helping to show just how a network can be probed / penetrated via simple techniques. The content is very easy to read and the information is collated in a logical manner. Worthwhile adding to a collection of other networking and security books, although not definitive.
Rating:  Summary: Protecting your Network and understand the Hackers world Review: Are you like I did trusting the firewalls to provide your security. (hardware and software wise) I did untill I read John's book how simple it is to bypass most security measures and hack into your systems. If you are responsible for any PC connected to the Internet by any other means than a Dialup connection or manage any PC network, this book and the software that is provided with the book is a MUST.
Rating:  Summary: Great Tool Review: this book is great for a learner who wants to get into the world of the hacker. I picked it up to become the Security manager for the company I work for with there servers. But I found the book was little hard to read at times, would be hard for a person who doesn't have a basic knowledge in the field. Can't wait to read the second one.
Rating:  Summary: A great tool Review: What a great book. I found the information in this book a necessity in learning about system security. A valuable part of my library.
Rating:  Summary: Best informative book I have ever read! Review: This is by far the best network security book I have ever read in my years of security consulting. I'd give it 6 stars if I could!
Rating:  Summary: Hmmmmmmm Review: Hmmmmmmmmmmmm, this book is a nice edition to any IT administrator's library. This title and the subsequent, Hack Attacks Denied, could have been easily placed into one large edition. Perhaps, the author wanted everyone to savor each interesting computer factoid? I will let the reader decide.Nice book and recommended.
Rating:  Summary: Outstanding Information Review: I am new to networking and computer security, but I would recommend this book to anyone who wants to be more familier with computers, networking, and computer security. The chapters on Well-known Ports and Their Services, The Hacker's Technology Handbook, and Port, Socket and Service Vunerability Penetrations are great. Also the Intuitive Intermission is good also. The "hacker notes" are easy to identify. I have used the Tiger Tool Kit to verify the security of my own network and think it's a pretty good suite.
Rating:  Summary: Great book, but code needs work Review: As an aspiring security consultant, I found that John's book covered the security scene well. He addressed every kind of security threat that I could remember, plus a few that I had not heard about yet. He does a decent job of describing the nature of each threat, and how each can be overcome. I highly recommend his book. John also provides a lot of source code in C and Visual Basic. I applaude him for that, and it was a significant factor in my choosing his book over others. However, his coding style leaves much to be desired. Much of the code is unnecessarily obscure due to issues with naming, modularity, and whitespace. Overall, his book can be improved upon, yet it outshines anything else I found available.
Rating:  Summary: Very interesting reading this... Review: I'm pretty new in "hacking" but are very interested in security and since these 2 things are close, I find this book interesting and fun to read, some chapters was very "simple" to understand but others were pretty hard and I was forced to read it twice (or more) to understand it. I I think it was a good investment for me to buy this book since I learned alot especially some programming knowledge.
Rating:  Summary: Most Useful Reference for Anyone Working in Security Review: As Audit Director for a $2.5 billion organization I must be concerned with a wide variety of challenges to our information security. This book is an excellent primer for any auditor who must be an active member of his/her organization's security team. The software included with the book is particularly helpful in countering the most common (and some not so common) attacks. Very hands on, very useful to the practitioner.
|