Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 21 22 23 24 25 26 27 >>

Rating: 5 stars
Summary: Lots of good stuff, well worth the money.
Review: Lots of good stuff, well worth the money. I've contacted the author and found out the original book was too big, so it was broken down into two books Hack Attacks Revealed for the exploits and procedures, and Hack Attacks Denied for the intrusion defense stuff.

Still there's 400 or so pages left for second editions!

A MUST BE part of any security collection.

Rating: 2 stars
Summary: Superficial
Review: I found this book mostly useless. It tries to cover way too much territory. The section on TCP, UDP, IP, Ethernet, etc. is so abbreviated and cryptic that it takes a good knowledge of these protocols to make out the author's intensions and fill in his gaps. If you don't already know these protocols, you certainly won't learn them here. The "C Tutorial" is ridiculous. The coverage of operating systems consists of a few holes for each OS, usually with a little assembly program to exploit it. You aren't told why the hole is there or how it is exploited. Then, after you've ceased to expect any topic to last more than a paragraph, you'll stumble across needless "references" like the nine-page list of binary and hex values from 0 to 255.

If you want to learn hacking and/or security, get a real C book; read the RFCs; learn all you can about administration, firewall design, and systems programming; and practice. This book purports to be a great shortcut, which pans out in a typical way. It couldn't be more useless.

What this book does do is provide exhaustive lists of hacking tools, many of which are included on the CD. It usually gives you a two- to three-sentence description of the tool and a screenshot covering half the page. (No wonder it's almost a thousand pages long!) Again, there is nothing on how it works. You could read the source code, except the code in the book is so full of typos you'll never debug it unless you already know what you're doing. I suppose if you're interested in installing trojans and running virus-construction software, this book will save you a lot of time rooting around FTP sites, but that at least involves a process by which you might learn something. This book won't teach you to be a security analyst or a hacker. It seems designed to make you a really well-armed script kiddie.

Rating: 5 stars
Summary: A Well - Explained Resource
Review: "Hack Attacks Revealed" is a well-explained learning tool and a great reference book. I really enjoyed this book because I am able to use the information I learned. John gives you the tools to help secure your network; it's now the your job, the reader, to apply the information given. "Hack Attacks Revealed" has proved to be a credible source of information. I look forward to completing the "Hack Attacks" series and future publications written by John Chirillo.

Rating: 5 stars
Summary: easy to read and understand
Review: Very good book. It's easy to read, not like typical technical books. The explanations are thorough and provide enough examples that even the most difficult topics make sense. Thank you from the not so technical :)

Rating: 5 stars
Summary: A Must Read !!
Review: Outstanding book. I'm a military officer working in the computer network defense realm. I am making it required reading for the all the folks who work for me! It provides a solid foundation on all aspects of network defense.

Rating: 5 stars
Summary: A Valuable Resource for Your Library
Review: This is the book many of us have been waiting for. If your company reimburses your book purchases then *great*...buy it. If they don't buy it anyway because this is a reference you're going to want to keep in your own library. The book covers all the bases...and there has been no shortage of links to information where I needed more depth. Some criticize that all of this info is available online if you do the footwork. That can be said about many publications (C***O P***S for example puts out many books that have almost verbatim examples from their documentation web site.) People like me, who buy books because broadband isn't everywhere yet (planes, trains, automobiles ;)), appreciate authors like Chirillo who put out great references that extend their own lifetimes via *current* links and a sweet TigerSuite (that's only getting better baby.) One thing that would have added more spice to the chili would have been a pdf version of the book on the CD...but many authors frown on that so it's really not a big issue...I guess...hint hint.

Rating: 5 stars
Summary: very pleased
Review: i am very pleased with this book. with thousands of links and reference material, covering every topic loaded with hacks and cracks, need i say more? great job!

Rating: 5 stars
Summary: A text book thriller
Review: Until now, I have never avidly read a reference book like this before. As soon as I started on John Chirillo's book "Hack Attacks Revealed" I had great difficulty putting it down until I had finished. The insight into the furtiveness of the hacker's mind gives this book the feel of a thriller. This book should be compulsory reading for anyone who connects a company to the Internet. In excellent detail, the book describes the communication over networks using the Internet Protocol (IP) and goes on to provide an overview of the programming methods used by Hackers. This is backed up by an extensive encyclopaedia of known hacker's tools and methods. This book will leave you fascinated, horrified...

Rating: 4 stars
Summary: It will always be a book that you will go back to time and t
Review: It was good to see another book on the market that someone has taken a lot of time searching the net for the latest information for the IT/Fraud/Security managers of the world.

The book goes into a lot of detail about the different risks involved in the IT security industry, if you are new to the industry then this is a must, don't be disappointed about this book, it will always be a book that you will go back to time and time again.

Rating: 5 stars
Summary: brilliant brilliant brilliant
Review: This is without a doubt the best book on the subject i have ever read, clear, concise, inciteful descriptions of every aspect of the field of computer security.If you were to buy one book on the subject, buy this one (and if you were to buy two, buy the sister to this book, "hack attacks denied"!)


<< 1 .. 21 22 23 24 25 26 27 >>

© 2004, ReviewFocus or its affiliates