Rating:  Summary: Good book... Review: This is a good book and i advise anyone who has is a sysadmin to read this. The chapters concerning communication protocols is very deep and it's is a lot better read then the OSI-book. This book is also nice since it shows you a lot of screenshots from hackingtools which are actually in use, this will stimulate one again to educate the users of a network not to run any emailed attachments. The list of public portnumbers and their programs is handy since some of the portnumbers are run by programs with a different name. The tutorials concerning C are a bit light if you are a serious programmer, if you are not a programmer then this is helpfull since it gives you some background one you scan the source code (which is plenty). The cd-rom is also nice because of the hacker toolkit. I've read some other 'hacker-handbooks' but this one is the best so far. My complaint with the other books is that they frequently referenced the internet. This book packs a lot of usefull and sometimes entertaining information.
Rating:  Summary: Best books out there! Review: Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker thinks and how hacker gets into your network. I was truly amazed at the information and the way it is presented is where for both types of users, advanced and Novices.Doesn't matter if you're new to this area of the IT industry or a veteran. These two books are a must have resources. It doesn't matter if you're a small business or a large IT firm. Hackers are trying to get anyone and everyone. It is best to be prepared. There is a set of utilities that come with the book, which is great. The book has a lot of real life examples and plenty of resources on the CD...
Rating:  Summary: Truly fascinating Review: An ambitious, comprehensive, and compelling investigation of the Underground. Truly a fascinating study of security evolution in action.
Rating:  Summary: Good books, lots of goodies Review: These are big books, whose value is in the hints & tips and graphical examples. The CDroms are loaded with goodies and some folks will find it useful to have all you need in one place. There are also extensive walkthroughs of some topics which makes it unique in this category.
Rating:  Summary: Great for a Beginner! Review: I myself have browsed the book, but my son has taken great interest in this book. It is great for beginners and advanced network security admins alike. I recommend this book to all that are interested in security!
Rating:  Summary: The book is terrific!! Review: Mr. Chirillo and I have this little communication problem. I think his writing is brilliant and informational--and then he drives me up a holy TREE with so many hacking truths that maybe should have remained unknown. Despite how I feel about it, the book is terrific, the information is cleverly introduced but not forced, and the explanations work things out just about the fairest way possible.
Rating:  Summary: These books come highly recommended to me Review: If the author hadn't been highly recommended to me by other readers, I'm not sure I would have tried the book. Normally I can't stand reading books on this topic: I'm so hyper-aware of the same exploits over and over. With this book, I found myself drawn to it in spite of myself. And I read the whole thing. And I did enjoy it. I have limited patience for puzzling out the meanings of security terms, but this book spells them out for you.
Rating:  Summary: When you reach Maximum Worry Capacity, turn to this book Review: There comes a point where a person can't take on any more worries. If I have to worry about the population explosion, free radicals, ozone, the greenhouse effect, AND cancer, I'm not going to be able to also worry about someone hacking into my computer, or worse, cracking. When you've reached Maximum Worry Capacity, turn to this book. I'm entirely convinced of the authors' points, which is that most of our worries are actually completely false as he shows us the real tricks of the trade.
Rating:  Summary: Fantastic!! Review: This is a fantastic security reference. I have finished this book and now half way through the next. This material is what I was looking for, something to really explain the hottest topic in computing and give diagrams, tricks, software and source code to get going.
Rating:  Summary: Hack Attacks delivers ! Review: "Hack Attacks Revealed" skips the arcane language and presents an easy to understand explaination of the essentials. The information is extremly well integrated, so much so that you wind up cruising through sophisticated topics that are usually daunting.
|