Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 15 16 17 18 19 20 21 .. 27 >>

Rating: 4 stars
Summary: Commendable and recommended
Review: If not for the benefits of TigerSuite and the very cool software, this book is commended for being the first to really spell out hacking in sensible steps. First you learn the ins and outs of networking and how it relates with the Internet, next you uncover the steps used in discovery and security testing, and then top it off with hundreds ofhacks for Windows, Unix, Apple/Mac, and hardware/software cracks for routers and firewalls. Very reommended read.

Rating: 5 stars
Summary: good choice
Review: if you're in the market for a good security book, look no further. the methods illustrated in this book are easy to understand even for beginners, and technical enough for the advanced user. i was very pleased with the tools and source code as i too like to see how the programs work.

Rating: 1 stars
Summary: Flows like molasis
Review: This book has some serious organizational issues. It reads like a succession of small essays with nothing holding them together. 'Essays' is a strong word, perhaps 'thoughts' is better. No, better yet, 'outbursts' - they read like quick definitive ideas on a matter without anything backing them up, running in one door and out the other without really proving the point. Until the second half, where it's nothing but undiscussed C code.

Rating: 1 stars
Summary: $h0uD4 b33n 3ncRyp73d
Review: This book should have been written in a hacker typeface. It would have taken a lot longer to get through it, and perhaps the challenge would have made it seem interesting. Instead you can read the entire book in a sitting of four hours or less because most of the material is either boring (let's learn the alphabet, budding hackers!) outdated (want to write for Windows 3.1?) or ignorable (here's a list of IP addresses, kiddies, isn't that illucidating?).

Rating: 1 stars
Summary: worse than advertized
Review: my friends told me not to buy this and i ignored them. i should have listened. this book would have been groundbreaking eight years ago, but its worthless in the 21st century. too outdated.

Rating: 2 stars
Summary: Read The Reviews
Review: Read the reviews and understand what you're buying before you pay [price] of your hard earned money for this book.

Go to a bookstore and take a minute to thumb through the pages to see what's in it. And the cd in the back of the book? Forget it - it's an eval. copy. You get a few programs that work 'out of the box' but in order to use the cd in it's entirety you have to pay an additional $5.00 at a website in order to activate the 'pro' version - LAME.

I wanted so much for this book to be what it advertised. I held out hope reading page after (fluff)page. I held out hope even after reading other reviews that trashed this book. I held out hope until I popped the cd into my computer and saw that the only thing John Chirillo revealed to me was that I wasted my time and money.

If you take away only one thing in this review, take this:

There are no shortcuts. Buy "Hacking Exposed", sit down in front of the computer, and do your homework. Good Luck

Rating: 5 stars
Summary: I can see why most admire this book
Review: I work for a large managed secure "Internet" infrastructure service provider. I'm part of the lead intrusion detection team and project manager for assisted policy development. I can see why most people admire this book and counter part 2, Hack Attacks Denied. The first is an extraordinary insight into the realities of network intrusions and countermeasures. There is extensive coverage of denial of service attacks, attacks utilizing remote procedure calls, case studies on legendary attacks such as Kevin Mitnick's, and up-to-date guidance on choosing network intrusion detection tools. If you are interested in the technical aspects of computer security, you'll find this book to be a good choice.

Rating: 1 stars
Summary: too long, too wrong.
Review: This book was too long, and contained too many completely wrong 'facts' and analysis, to be usable by anyone actually into hacking or the security field...

Rating: 4 stars
Summary: Get on top in just days.
Review: Learn how to program your own security test code, and find your own security breaches in just days… This book is a breakthrough for your own analysis program to find those weak points! And introducing Tiger suite, the COMPLETE online set of tools, in just days you’ll see measurable results in your own method. BONUS: But not to worry, to insure your success the guys at support will work with you every step of the way.

Rating: 1 stars
Summary: More inacuracies than pages
Review: This book has more show-stopping mistakes than it has pages -- and that's hard to do in a book this size. I stopped reading this book for content a long time ago, and now only read it when I'm bored at work and need a laugh.


<< 1 .. 15 16 17 18 19 20 21 .. 27 >>

© 2004, ReviewFocus or its affiliates