Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 13 14 15 16 17 18 19 .. 27 >>

Rating: 5 stars
Summary: Youll find this book useful
Review: This is a very informative book. It's full of submissions from numerous hackers which boosts both its insight and readability. Despite the book's title as 'hackers' are 'attackers', instead the hackers come across as intelligent, funny, computer-obsessed experimenters who can't resist a challenge. With over 900 pages, whose value lies in the hints & tips and graphical examples. The CD is loaded with goodies and some folks will find it useful to have all you need in one place. There are also extensive walkthroughs of some topics which makes it unique in this category.

Rating: 5 stars
Summary: Awesome
Review: As a security reference this book is awesome. I found exactly what I was looking for in a matter of minutes. Thnx.

Rating: 5 stars
Summary: I can appreciate the importance of security.
Review: After flipping through this book I now have a better sense how cracking works. My company has been seriously cracked recently and some of the chapters gave me insight on how and where they may have originated. Knowledge is power and after reading some of this book,I feel confident I can find the rest of the exposed parts of my network.

Rating: 5 stars
Summary: the right stuff
Review: one of the most revealing looks i've read since exposed

Rating: 5 stars
Summary: Hack Attacks Revealed
Review: This book contains an excellent in depth knowledge of networks and protocols and gives insight in their weeknesses and exploitablility.
It is closely linked in with the RFCs and encourages a hands on approach. I have learnt alot since buying this book. The tiger tools save you time in collecting all those dodgy pieces of software from around the web and include some tools I have ot seen before which I am looking ofrward to exploring in more depth.

Rating: 5 stars
Summary: This book shows the reader "how to".
Review: This book describes the security issues of several platforms, including Windows 9x/ME, Windows NT, Unix, Novell NetWare, and certain firewalls, proxies, routers. It also explains what sorts of attacks against these systems are feasible, which are popular, and what tools exist to make them easier. The author provides examples in steps that walk through numerous attacks, explaining exactly what attackers want, how they defeat the relevant security features, and what they do once they've achieved their goal. If you have a computer, network, or Internet connection, you may want to supplement your security with this practical-minded text.

Rating: 2 stars
Summary: Slightly disapointed
Review: This book is an excellent reference for networking / protocols etc, with a few scant comments of how these protocols are vulnerable. Most of the info in the appendixes can be found in RFC's and has been pulled straight out. The extensive list of port references as an example. The tiger tool kit looked promising for the out of the box hacker but I was suprised to see that there was only a limited edition (limited by functionality) included. Some interesting scripts and a different approach than other books I have read which was nice. Made me brush up on the network stuff but nothing you cant learn from a good tcp/ip book. All in all interesting, well written but it seems the only way you are ever going to hack anything is to build your own lab and learn it yourself.

Rating: 5 stars
Summary: best of breed
Review: best of the breed even if it falls short in some areas. that's ok cause now there is room for improvement and growth for the next edition. to everyone who has ever asked 'how to hack', start with this book. be sure to read every page. this will save you time and effort wasted with search engines.

Rating: 5 stars
Summary: i recommend this book
Review: as a cissp i recommend this book to all my colleagues. Indeed there is a shortage of firewalling, but the depth on ports and services and overall coverage of common hacking makes well up for it. also the cdrom is colossal. cheers.

Rating: 5 stars
Summary: Having the right tools during an attack
Review: As a network administrator for an Internet Service Provider, I've witnessed numerous types of assaults on our clients as well as our own backbone. Hack Attacks Revealed not only clarified the modus operandi of these attacks but also helped me put a 'honeypot' game plan in place to investigate them. I'm enormously grateful for the technology primers, especially the header details and sniffer snapshots. These were significant in my pinpointing the most critical attacks in the debug data. Priceless.


<< 1 .. 13 14 15 16 17 18 19 .. 27 >>

© 2004, ReviewFocus or its affiliates