Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 2 3 4 5 .. 27 >>

Rating: 5 stars
Summary: Good book...
Review: This is a good book and i advise anyone who has is a sysadmin to read this. The chapters concerning communication protocols is very deep and it's is a lot better read then the OSI-book. This book is also nice since it shows you a lot of screenshots from hackingtools which are actually in use, this will stimulate one again to educate the users of a network not to run any emailed attachments. The list of public portnumbers and their programs is handy since some of the portnumbers are run by programs with a different name. The tutorials concerning C are a bit light if you are a serious programmer, if you are not a programmer then this is helpfull since it gives you some background one you scan the source code (which is plenty). The cd-rom is also nice because of the hacker toolkit. I've read some other 'hacker-handbooks' but this one is the best so far. My complaint with the other books is that they frequently referenced the internet. This book packs a lot of usefull and sometimes entertaining information.

Rating: 5 stars
Summary: Best books out there!
Review: Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker thinks and how hacker gets into your network. I was truly amazed at the information and the way it is presented is where for both types of users, advanced and Novices.

Doesn't matter if you're new to this area of the IT industry or a veteran. These two books are a must have resources. It doesn't matter if you're a small business or a large IT firm. Hackers are trying to get anyone and everyone. It is best to be prepared.

There is a set of utilities that come with the book, which is great. The book has a lot of real life examples and plenty of resources on the CD...

Rating: 5 stars
Summary: Truly fascinating
Review: An ambitious, comprehensive, and compelling investigation of the Underground. Truly a fascinating study of security evolution in action.

Rating: 5 stars
Summary: Good books, lots of goodies
Review: These are big books, whose value is in the hints & tips and graphical examples. The CDroms are loaded with goodies and some folks will find it useful to have all you need in one place. There are also extensive walkthroughs of some topics which makes it unique in this category.

Rating: 5 stars
Summary: Great for a Beginner!
Review: I myself have browsed the book, but my son has taken great interest in this book. It is great for beginners and advanced network security admins alike. I recommend this book to all that are interested in security!

Rating: 5 stars
Summary: The book is terrific!!
Review: Mr. Chirillo and I have this little communication problem. I think his writing is brilliant and informational--and then he drives me up a holy TREE with so many hacking truths that maybe should have remained unknown. Despite how I feel about it, the book is terrific, the information is cleverly introduced but not forced, and the explanations work things out just about the fairest way possible.

Rating: 5 stars
Summary: These books come highly recommended to me
Review: If the author hadn't been highly recommended to me by other readers, I'm not sure I would have tried the book. Normally I can't stand reading books on this topic: I'm so hyper-aware of the same exploits over and over. With this book, I found myself drawn to it in spite of myself. And I read the whole thing. And I did enjoy it. I have limited patience for puzzling out the meanings of security terms, but this book spells them out for you.

Rating: 5 stars
Summary: When you reach Maximum Worry Capacity, turn to this book
Review: There comes a point where a person can't take on any more worries. If I have to worry about the population explosion, free radicals, ozone, the greenhouse effect, AND cancer, I'm not going to be able to also worry about someone hacking into my computer, or worse, cracking.

When you've reached Maximum Worry Capacity, turn to this book. I'm entirely convinced of the authors' points, which is that most of our worries are actually completely false as he shows us the real tricks of the trade.

Rating: 5 stars
Summary: Fantastic!!
Review: This is a fantastic security reference. I have finished this book and now half way through the next. This material is what I was looking for, something to really explain the hottest topic in computing and give diagrams, tricks, software and source code to get going.

Rating: 5 stars
Summary: Hack Attacks delivers !
Review: "Hack Attacks Revealed" skips the arcane language and presents an easy to understand explaination of the essentials. The information is extremly well integrated, so much so that you wind up cruising through sophisticated topics that are usually daunting.


<< 1 2 3 4 5 .. 27 >>

© 2004, ReviewFocus or its affiliates