Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 16 17 18 19 20 21 22 .. 27 >>

Rating: 5 stars
Summary: Hack Attacks Revealed
Review: As an ISP Security Administrator I see all kinds of attacks. With over 10 years on the Job there is not a lot I have not seen. Mr. Chirillo Does a GREAT job of getting the basics across, From the OSI to Code to exploits. This book is direct and to the point. No Jokes like the IDG books. No Bragging like others.Easy to read,It has very few Editoral errors. With very little training you can be up and running scanners, sniffers, ect. With very good viable source code and a very good CD this book has all you need to do your job as a Security Tech. Well every thing but the common sense. If you are a Newbie to the Black Hat/ White Hat arena this is a MUST read! Mr. Chirillo can protect my Network any time.Better yet his book is going to help me do it. Shep Kohler MCP,MCDBA, CNA, A+, CET

Rating: 5 stars
Summary: great for begginers and experts
Review: this will help you to learn about all of the fundimentals of hacking and how to stop it from happening to you as well.

it will teach you step by step what to do and how to do it.

it comes bundled with great stuff that saves plenty of time not looking all over the net and has a huge resource of links if you cant find anything.

this is great for begginers as well as it will teach you lots that you dont know and for experts if you do know it, it is a great way to brush up your knowledge.

Rating: 5 stars
Summary: This book helped me make a contingency plan.
Review: Disaster can strike at any time, making a contingency plan an essential part of an effective IT security strategy. This book helped me create my company's contingency plans on the particular types of security breaches. The costs of developing and implementing a thorough plan can be significant, though the costs of business down-time and a damaged reputation will always be greater. but thanks to books like Hack Attacks Revealed and Denied, I saved thousands.

Rating: 5 stars
Summary: serious stuff
Review: the book is more serious than i expected. for serious security, try this informative book.

Rating: 5 stars
Summary: AUI Hack Attacks Revealed Review
Review: This describes the security characteristics of Windows/NT, Unix, Novell NetWare, and others. It also explains what sorts of attacks against these systems are feasible, which are popular, and what tools exist to find out. The author walks you through numerous attacks, explaining exactly what attackers want, how they defeat the relevant security features, and what they do once they've achieved their goal. Good "check-it-out" book.

Rating: 1 stars
Summary: Not What I Expected
Review: This book had a few positive qualities, but I'm afraid it's weaknesses outweight its strengths.

If you are a script kiddie looking for a how-to reference of shrink-wrapped hacking tools, this may be the book for you. If you are a technical person looking for a book on hacking techniques or a network admin looking for ways to keep your network secure, I would pass on this one.

The explainations of topics in this book are vague and often misleading. The simple topics are explained ad-nauseum, and the difficult topics are breezed over, completely ignored, or inaccurately explained. The book consists mainly of screenshots, one-paragraph summaries of various hacking tools, and lots of useless tables. Explainations of exploits consist of "Tool X can exploit a security hole in the daemon listening on port Y" without explaining why the security hole is there, what the security hole is, or even how the exploit works....

Overall, If you want a good book on security, I suggest you take a look at "Applied Cryptography"....

Rating: 5 stars
Summary: Top material
Review: This book is TOP material: I also like comparing the source code with hacks, I found the port numbers and services to be very handy and valuable in my work and the book is a great resource you must have as an engineer. The book was recommended to me by several people and I too will do the same for you.

Rating: 1 stars
Summary: Diabled.
Review: ....I bought this book for the 'Custom Hacking Toolkit' which is in the CD on the back. Turns out that this 'custom' toolkit is little more than windows (yes, windows!) program that helps run other security auditing tools that were written by other folks. Most of the features are disabled until you buy an upgrade from the website. Until then you have a pretty menuing system that won't do anything....

Rating: 1 stars
Summary: Worst of the web
Review: This book is only a compilation of already available information. Now if this were a 'The best of the Web -- Security Edition' then perhaps I could understand. It could have been a quick place on paper to find all the information you need, even if it's nothing new on it's own. Instead this is a jumble of things that aren't tied together, and at least half of which are outdated. The last time I needed to write a TSR was in 1990 - is this state of the art today? Sure, if you still use your old 286 machine on a daily basis. Do you need a copy of the ASCII table? This is your source. You could, of course, type 'man ascii' on your unix machine and get it for free. What this book needed was a big pair of scissors to cut out the cruft and leave the gold. Right now I can't see anything shiny through the dark.

Rating: 1 stars
Summary: How many trees died to make this thing?
Review: I've read some of the other reviews here and all are either really really good or really really bad which made me wonder about the content--so I got it and I can say that it's really really bad. I can't figure out why some readers find it so helpful and wonderful when it clearly isn't. It's not the worst reference in the world, but it definitely isn't five stars great either. I have bought my share of security references and taken my share of classes so I feel justified in stating that the information could have been organized and written a lot better. It reads as though the author knew what he wanted to say, but it wasn't explained well--which makes for a poor technical guide. It's for those of us out there that want to learn it from someone who not only has the knowledge, but can convey that knowledge in a concise way. Can anyone out there recommend a better guide for me to get this information?


<< 1 .. 16 17 18 19 20 21 22 .. 27 >>

© 2004, ReviewFocus or its affiliates