Rating:  Summary: Do yourself a favor and get this book Review: An interesting addition to books on security. If you've enjoyed the Hacking Exposed books, you'll also like the Hack Attacks references. I agree it's like a "no holds barred" portrayal of hacking.
Rating:  Summary: Great book for anyone... Review: I've been using this book as a guide for helping to secure my company's network. Although I have experience with networks and ports, I found the networking guide to be useful for enrichment purposes. I felt comfortable giving this book to our company interns, knowing that they would understand it thoroughly. Great book for any level!
Rating:  Summary: Prepare to be scared! Review: If you have anything to do with any operating system or network device you must have this book in your library. It's easy to read and has a lot of real world knowledge. This book will increase your awareness of what can really happen to your servers and how! I won't even get started on the Tiger Suite tools on the CD!!! Two words'BUY IT!
Rating:  Summary: Interesting book Review: I've read a number of security books recently, but this one is currently on my desk. It turned out to be surprisingly readable and interesting.
Rating:  Summary: Crucial reading for everyone. Review: I spend more time playing games online than hacking computers but when one of my game sessions was cut short when zombies attacked my server I had to find out more. I'm not exactly a guru, but I do have a small archive of various "evil" code that I've harvested over the years to study. However, I still didn't have nor understand the more recent attacks. So this book is crucial reading for getting anyone up to speed, especially with the latest fad in viruses, trojans and zombies. Add in the relatively recent proliferation of "script kiddies" and crackers and this book becomes a must have for any decent library. It is important for every body to understand the numerous holes in OS security, the roots of TCP/IP and the lax nature of human beings. With XP on the horizon, this knowledge becomes even more important. This book is certainly not the know-all, cure-all that some people are touting, but it is a darn good start in the right direction.However, I do have two complaints. The first is that the book has some unusual typos that make it hard to understand a number of things. The book does a very very poor job showing the correct position of the bits when explaining how the TCP protocol works. As well as the correct position of various values in relation to other values. Tables that need (and the author recommends doing this) to be compared to each other tend to be on wholly different pages, this makes for a lot of unnecessary page flipping. This may not be the fault of the author since the format may have been correct when it was written but some how got altered from his desk to mine. Still, that should have been noticed and corrected. My last complaint is that the reading is very dry. Imagine Ben Stein reading Stephen King's IT to you. Long and DRY. Even though I feel that every one should come to terms with the wild wild web.This book will only make sense to those in the industry. Too bad, still, it is a very good book and one that earns an honorable place on my shelf between "The Hacker Ethic" and "Code Complete"
Rating:  Summary: A comprehensive guide to security and hacking Review: Hack Attacks Revealed is a comprehensive guide to security, hacking, and the underground. This is an amazing book, not only for its content but also its accompanying CD-Rom. There's a real sense, throughout the book, of the author's personality and programming prowess. Some introductory books will only talk about computer ports and exploits, but the focus on this one is to show you by example, tackling advanced issues. It teaches you how to network, internetwork, hack, and to think like a hacker, to really understand the sensitivity of these gurus. The wealth of experience of the author is contained within these pages, and is an invaluable learning tool. I highly recommend this book; this comprehensive guide is an excellent value, and a long lasting reference when working in the field today.
Rating:  Summary: Will the REAL security expert PLEASE STAND UP! Review: I am very pleased with the efforts of this author, he is the new Slim Shady of security. Hack Attacks Revealed will be a permanent addition to my collection, and I'll refer to it often.
Rating:  Summary: Don't waste another minute Review: The software on this CD-Rom is nothing less than a superb collection of security material. Tigertools is like bringing the power of unix to windows. Don't waste another minute, get a copy and see for yourself.
Rating:  Summary: Fantastic Network Security Review: Teaches the network administrator just what he or she needs to be aware of with internet connected machines. Very thorouh yet at the same time written in a very readable and clear style. Excellent.
Rating:  Summary: Revealed works for me! Review: I really can't understand how someone wouldn't learn from this book. I'm 1 yr new to networking and have been assigned the task of tackling the security of our networks too. I bought the book this weekend and I've learned much already. There is more detail in the explanations than I could have expected. Thanks for a great reference and learning tool.
|