Rating:  Summary: Commendable and recommended Review: If not for the benefits of TigerSuite and the very cool software, this book is commended for being the first to really spell out hacking in sensible steps. First you learn the ins and outs of networking and how it relates with the Internet, next you uncover the steps used in discovery and security testing, and then top it off with hundreds ofhacks for Windows, Unix, Apple/Mac, and hardware/software cracks for routers and firewalls. Very reommended read.
Rating:  Summary: good choice Review: if you're in the market for a good security book, look no further. the methods illustrated in this book are easy to understand even for beginners, and technical enough for the advanced user. i was very pleased with the tools and source code as i too like to see how the programs work.
Rating:  Summary: Flows like molasis Review: This book has some serious organizational issues. It reads like a succession of small essays with nothing holding them together. 'Essays' is a strong word, perhaps 'thoughts' is better. No, better yet, 'outbursts' - they read like quick definitive ideas on a matter without anything backing them up, running in one door and out the other without really proving the point. Until the second half, where it's nothing but undiscussed C code.
Rating:  Summary: $h0uD4 b33n 3ncRyp73d Review: This book should have been written in a hacker typeface. It would have taken a lot longer to get through it, and perhaps the challenge would have made it seem interesting. Instead you can read the entire book in a sitting of four hours or less because most of the material is either boring (let's learn the alphabet, budding hackers!) outdated (want to write for Windows 3.1?) or ignorable (here's a list of IP addresses, kiddies, isn't that illucidating?).
Rating:  Summary: worse than advertized Review: my friends told me not to buy this and i ignored them. i should have listened. this book would have been groundbreaking eight years ago, but its worthless in the 21st century. too outdated.
Rating:  Summary: Read The Reviews Review: Read the reviews and understand what you're buying before you pay [price] of your hard earned money for this book. Go to a bookstore and take a minute to thumb through the pages to see what's in it. And the cd in the back of the book? Forget it - it's an eval. copy. You get a few programs that work 'out of the box' but in order to use the cd in it's entirety you have to pay an additional $5.00 at a website in order to activate the 'pro' version - LAME. I wanted so much for this book to be what it advertised. I held out hope reading page after (fluff)page. I held out hope even after reading other reviews that trashed this book. I held out hope until I popped the cd into my computer and saw that the only thing John Chirillo revealed to me was that I wasted my time and money. If you take away only one thing in this review, take this: There are no shortcuts. Buy "Hacking Exposed", sit down in front of the computer, and do your homework. Good Luck
Rating:  Summary: I can see why most admire this book Review: I work for a large managed secure "Internet" infrastructure service provider. I'm part of the lead intrusion detection team and project manager for assisted policy development. I can see why most people admire this book and counter part 2, Hack Attacks Denied. The first is an extraordinary insight into the realities of network intrusions and countermeasures. There is extensive coverage of denial of service attacks, attacks utilizing remote procedure calls, case studies on legendary attacks such as Kevin Mitnick's, and up-to-date guidance on choosing network intrusion detection tools. If you are interested in the technical aspects of computer security, you'll find this book to be a good choice.
Rating:  Summary: too long, too wrong. Review: This book was too long, and contained too many completely wrong 'facts' and analysis, to be usable by anyone actually into hacking or the security field...
Rating:  Summary: Get on top in just days. Review: Learn how to program your own security test code, and find your own security breaches in just days… This book is a breakthrough for your own analysis program to find those weak points! And introducing Tiger suite, the COMPLETE online set of tools, in just days you’ll see measurable results in your own method. BONUS: But not to worry, to insure your success the guys at support will work with you every step of the way.
Rating:  Summary: More inacuracies than pages Review: This book has more show-stopping mistakes than it has pages -- and that's hard to do in a book this size. I stopped reading this book for content a long time ago, and now only read it when I'm bored at work and need a laugh.
|