Rating:  Summary: One for all Review: Exceptional book for everyone. The veteran engineer will find the advanced material and programming technically challenging, while the beginner will be educated and enlightened with the hottest security methods. And there's so much more to this book than that. The best part might be the utilities and techniques given for testing your own computers and networks. I think you'll enjoy.
Rating:  Summary: Excellent Review: Excellent book - much reference. Found the CD very useful and it had alot of utilities that came in handy from a potential hack attack.
Rating:  Summary: Hack Attacks Revealed is Astonishing!!! Review: John Chirillo's Hack Attacks Revealed is truly an amazing book. Most so-called "hackers" are reluctant to share their knowledge with "newbies" attempting to gain a knowledge of computers. John Chirillo lays it all down in easy to understand, laymans terms and holds nothing back. He has done a great job of demystifying the world of computer security and the "hacker". Perfect for anyone with a need or desire to understand computer security and even for those who would like to gain an understanding of how the internet works and computers communicate with eachother. Professionals can benefit from this book as well with its references and truly astonishing collection of programs,tools, and links provided with the accompanying CD-ROM. Hack Attacks Revealed is one of the best security books I have found.
Rating:  Summary: 4/5 stars and a thumbs up Review: I've read all the reviews posted here and thought I would join in too. What can I say about this book? Well it starts out a little dry but certainly picks up the beat after the internetworking tutorials. I particularly like the style the author used and the way each topic intertwined with more serious security technologies later on. Although I found some errors, the overall material was organized well and explained in great detail. A picture says a thousand words, and that's what I like most about the many examples (the author doesn't spare any expense with this book's illustrations). I consider myself well read when it comes to this topic, and this book opened the door to many new interesting methods. 4/5 stars and a thumbs up.
Rating:  Summary: Review for Hack attacks revealed and denied Review: I am looking for topics about hacking and cracking for years. And got some books to read. But I never get the idea of how hacking and cracking really is. Recently I saw Hack Attacks revealed and Denied. I bought both of them and read both books thoroughly. Now I know what is hacking and cracking. and how to implement and defend them. This is the best book I saw in the book store. As a Cisco security engineer, they gave me a lot of help.
Rating:  Summary: Time and money well spent Review: I also ordered this book with great expectation and found it to be well worth the money and time. Chirillo gets 5 stars for a well prepared, well written manuscript. This book covers the security and hacking, for networks and individuals, touching interest at every level. Great work!
Rating:  Summary: Compelling Review: I have just finished reading Mr. Chirillo's Hack Attack book - what a good read. The very compelling reading kept me glued to each topic. It's an excellent learning guide for those starting in the network security field.
Rating:  Summary: A fighting chance Review: As a vocational educator (in a totally different field) and as a new system's administrator I would give Mr. Chirillo an "A" for educational style and content.Initially the book provides insight into various concepts of network technologies. This includes physical layers, networking layers, communication protocols, subnets, and computer ports needed to understand how the hacker functions. After reviewing the technologies of networking, the author progresses to methods used by hackers to uncover system vulnerabilities and methods of network disruption. Throughout the book are notes providing the author's insights and recommendations for further research. The book also contains a large appendix of reference materials including IP tables, ports and services, common virus, and codes. I really liked the way the author gradually imparts to the reader pertinent information by building on previous chapters. The system administrator with little or no hacking experience now has tools to discover and correct security problems. Mr. Chirillo gives the reader an understanding of the mindset as well as the how's and why's of hacking. This provides a powerful tool in securing the network from intrusions.
Rating:  Summary: This book is an astonishing reference volume Review: This book is an astonishing reference volume. Particularly fascinating is the real-world illustrative examples scattered throughout. It is an excellent and eye-opening book, as fine and accurate a portrayal of security topics as you will find anywhere. Chirillo manages to provided a layman understanding of these topics, in a format compatible for the beginner to the advanced.
Rating:  Summary: Deserving book!! Review: Firstly, in this day and age a good reference and introduction is critical. Obviously there wasn't enough room in the book for some information. Have you checked the CD? There are links to every RFC, vendor source, etc. There are direct links to Bugtraq, Vuln-Dev, SecurityFocus, Technotronic, Packet Storm ... The author is trying to cover the spectrum as an introduction as well. In the book's introduction, he explains that managers, etc...can use this reference. It should be obvious to you that managers are typically NOT all that technical, hence the author's overall style again. As a side note, I have contacted the author. He doesn't claim his book to be the "best". He also recommends buying other books like Hacking Exposed, etc. He says his books fill in the gaps so-to-speak. Considering this - you'll have to agree he's got a lot of integrity. Also, did you know he was a Grandmaster and has worked with King and Trelford?? Very interesting stuff. Also, have you read about tigertool town? I think you'll find it interesting also.
|