Rating:  Summary: A must read for any security consultant Review: I'm not even through with reading the entire book and have already received back my investment 10 fold. The exploits and vulnerabilities that I have found and secured on our servers at work (and even at home) have been invaluable. I'm going to rush out and get 'Hack Attacks Denied' just because I know it will be a smooth continuation in the series. Thank you John Chirillo for being as forward and honest to write such books. The war against Hackers will never cease but now we will have the ball in our court for a while.
Rating:  Summary: Great Book Review: Since I use cable modem and DSL, I am very interested in network security. Reading this book caused me even greater concern, so I also bought Hack Attacks Denied. The included port scanner revealed a back door(rasmin) on my computer which I was able to remove. This had apparently slipped by all the security I have installed. That alone was worth the price of the books. I now know to make security even tighter.
Rating:  Summary: Excellent resource even for professional net administrator Review: I didnt have too much experience in network security, when I bought the book I found a very explicit material, just to the point, like I really like books... From the chapter one to the last is just the fact, very easy to undestand even if you doesnt know too much about computer (like me)... Discover a new world with this excellent book... and the best is that you receive a nice cd with a lot of utilities...
Rating:  Summary: The defense is a good offense Review: If you are responsible for the security of your network, then you need to know how people will be breaking in. Armed with the information in this book and Hack Attacks Denied you can begin to understand how hackers look at technology like DNS, TCP/IP, and ICMP. This book brings network security out of the shadows.
Rating:  Summary: Very Good Book Review: John does an excellent job with this book! It is the first I've found to offer not only details outlining common vulnerabilities to each port, but a good review of the background knowledge (TCP/IP and C/++) required to fully understand the exploits. Lots of source code for deconstruction as well. The CD and related customer support have been excellent as well. A must read for any security practioner. In addition, I highly recommend this book as an adjunct for classroom or lab teaching in Infosec related classes.
Rating:  Summary: Great Help for College Review: My step-father is in the air force (23rd Info Ops) to be exact and they ALL received this book. So naturally I started reading it and it has been a great help for me. I just started college and with the help of this book im way ahead of my class. John makes it all easy to learn and it's a great base to build on. One can only hope he keep's writing.
Rating:  Summary: From the Ground Up Review: I am trying to change careers and one of the careers I was looking at was the IT field. Specifically Computer Security. This is THE book to get and read to become familiar with the jargon and the concepts. This is a quality book one that helps you to grasp very complex concepts regarding computer security. I highly recommend it for those who are just starting out and those of you who are professionals
Rating:  Summary: A Great Resource Review: The book is a great resource on the fundamentals of network security. I found it thorough and informative.
Rating:  Summary: Sensible and down to earth Review: A great book which has not only character but a sense of enthusiasm which did not always shine through in such regarded volumes as "Hacking Exposed". Due to the nature of My/my companies work multiple copies have been bought and all have been snapped up by my consultants..indeed "Hack Attacks DENIED" seems to be preferable to a pay advance... isnt the world a funny place...but atleast with John Chirillo's series its a more informative one.
Rating:  Summary: Hack Attacks Revealed Review: This book was a revelation! It is the bible for all would-be hackers or serious computer professionals. It is essential reading for all senior managers of businesses who, whether they know it or not, are under threat.Well written and can be followed by the non-computer specialist.
|