Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit |
List Price: $59.99
Your Price: $37.79 |
 |
|
|
Product Info |
Reviews |
Rating:  Summary: Youll find this book useful Review: This is a very informative book. It's full of submissions from numerous hackers which boosts both its insight and readability. Despite the book's title as 'hackers' are 'attackers', instead the hackers come across as intelligent, funny, computer-obsessed experimenters who can't resist a challenge. With over 900 pages, whose value lies in the hints & tips and graphical examples. The CD is loaded with goodies and some folks will find it useful to have all you need in one place. There are also extensive walkthroughs of some topics which makes it unique in this category.
Rating:  Summary: Awesome Review: As a security reference this book is awesome. I found exactly what I was looking for in a matter of minutes. Thnx.
Rating:  Summary: I can appreciate the importance of security. Review: After flipping through this book I now have a better sense how cracking works. My company has been seriously cracked recently and some of the chapters gave me insight on how and where they may have originated. Knowledge is power and after reading some of this book,I feel confident I can find the rest of the exposed parts of my network.
Rating:  Summary: the right stuff Review: one of the most revealing looks i've read since exposed
Rating:  Summary: Hack Attacks Revealed Review: This book contains an excellent in depth knowledge of networks and protocols and gives insight in their weeknesses and exploitablility. It is closely linked in with the RFCs and encourages a hands on approach. I have learnt alot since buying this book. The tiger tools save you time in collecting all those dodgy pieces of software from around the web and include some tools I have ot seen before which I am looking ofrward to exploring in more depth.
Rating:  Summary: This book shows the reader "how to". Review: This book describes the security issues of several platforms, including Windows 9x/ME, Windows NT, Unix, Novell NetWare, and certain firewalls, proxies, routers. It also explains what sorts of attacks against these systems are feasible, which are popular, and what tools exist to make them easier. The author provides examples in steps that walk through numerous attacks, explaining exactly what attackers want, how they defeat the relevant security features, and what they do once they've achieved their goal. If you have a computer, network, or Internet connection, you may want to supplement your security with this practical-minded text.
Rating:  Summary: Slightly disapointed Review: This book is an excellent reference for networking / protocols etc, with a few scant comments of how these protocols are vulnerable. Most of the info in the appendixes can be found in RFC's and has been pulled straight out. The extensive list of port references as an example. The tiger tool kit looked promising for the out of the box hacker but I was suprised to see that there was only a limited edition (limited by functionality) included. Some interesting scripts and a different approach than other books I have read which was nice. Made me brush up on the network stuff but nothing you cant learn from a good tcp/ip book. All in all interesting, well written but it seems the only way you are ever going to hack anything is to build your own lab and learn it yourself.
Rating:  Summary: best of breed Review: best of the breed even if it falls short in some areas. that's ok cause now there is room for improvement and growth for the next edition. to everyone who has ever asked 'how to hack', start with this book. be sure to read every page. this will save you time and effort wasted with search engines.
Rating:  Summary: i recommend this book Review: as a cissp i recommend this book to all my colleagues. Indeed there is a shortage of firewalling, but the depth on ports and services and overall coverage of common hacking makes well up for it. also the cdrom is colossal. cheers.
Rating:  Summary: Having the right tools during an attack Review: As a network administrator for an Internet Service Provider, I've witnessed numerous types of assaults on our clients as well as our own backbone. Hack Attacks Revealed not only clarified the modus operandi of these attacks but also helped me put a 'honeypot' game plan in place to investigate them. I'm enormously grateful for the technology primers, especially the header details and sniffer snapshots. These were significant in my pinpointing the most critical attacks in the debug data. Priceless.
|
|
|
|