Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 23 24 25 26 27 >>

Rating: 5 stars
Summary: Hack Attacks Revealed
Review: The book is simply incredible. It took me from neo-luddite to kiddie scripter just by reading the table of contents. Not a drop of ink was wasted as every nibble of information in the book provides valuable insight into a hacker's mind. Anyone who has a computer hooked to the Internet will want to read this book! The Tiger Tools included with the book are indispensible!

Rating: 5 stars
Summary: Overall great book and a must have!
Review: I was IMMEDIATELY impressed with the contents and completeness of this hacking and security book. I was most impressed that the illustrations are simplified and most include simple steps. Second in line would be the very interesting internetworking primers that I'm using to study with. Overall great book and a must have!

Rating: 5 stars
Summary: Excellent Network Security Reference
Review: John was written an excellent set of books. The organization and content lend to a superior training manual for the security consultant. I was very impressed with the chapters concerning specific breaches and source code examples. Mr. Chirillo should be applauded for the completeness of his work. While new exploits appear on a daily basis, John has given the reader sufficient links to online resources to remain current. My firm is requiring that Mr. Chirillo's books be read by all persons who will be performing any security work for our clients. I look forward to any further publications from John.

Rating: 5 stars
Summary: The best book i've read on hacking to date
Review: First off let me just say that I don't usually do book reviews, but this book is going to be the exception to that rule, simply because of how good it actually is. I'm interested in hacking and have several books on the subject, all good but skimming over certain areas. Thats where this book differs, you start off by getting an indepth explanation of protocols such as tcp/ip, ipx, spx, netbeui to name just a few, how they connect and send data etc. Interesting and well explained, but like most I bought this book soley for the hacking side of things.. Everything is covered, scanning techniques, port vulnerability penetrations, operating systems, the hackers programming language C to name very few (to list everything would take me ages). All the information within this book is explained very clearly and without leaving you with that feeling of "hmmmm, so what is that actually doing then" I especially like the Hacker's Notes throughout, which give you little bits of extra information such as what to pay extra attention to in a given paragraph etc. The cd has to rank as one of the best, if not THE best that I have seen accompanying a book of this nature, It has absolutly loads of stuff on it. Another plus for this book that I must mention is that the author John Chirillo does reply very quickley to your emails if you write with any queries etc.

I'll end with this, if you are interested in hacking and security and want good clear explanations on the subjects, you simply must get this book.

Rating: 4 stars
Summary: Too many technical tutorials
Review: Good book but too many technical tutorials. Maybe cool from a hacker point of view, but I prefer the good stuff only. One extra star for the HUGE port/serv/troj section.

Rating: 4 stars
Summary: A very good learning reference
Review: The tutorials are very good! I learned more about TCPIP in this book than from four others combined. For me the security hacking secrets were just an added bonus. Great job to Chirillo and John Wiley & Sons.

Rating: 5 stars
Summary: Nothing less than excellence!
Review: This book is confrontational, challenging, technologically thorough and the CD is one of the better mixtures security stuff. I usually never post reviews unless I come across something high quality. I feel a little cheated that I now have to buy Hack Attacks Denied to see all the countermeasures. No! I take that back, the book would have been too big and therefore they would have cut too much I fear. But for the money I hope book2 is comparable. Regardless book1 is nothing less than excellence.

Rating: 5 stars
Summary: good information
Review: i just recently purchased your software via your web. i like it alot. in reference to the above i thought you want to know that your book and software included some of EXaCT same methods used by those chinese hackerz. the means literally saved me! i was in time able to secure my nets. grats.

Rating: 5 stars
Summary: The "truth" about hacking and the underground
Review: At first I thought, "yeah right, another security book (yawn)." Even then I waited before reading the book. Boy was I wrong, this is one of the most comprehensive references to date! Well over 900 pages of details, both technical and informational. At that point, I haven't seen the CD, but I did see a content list, and I've heard tiger suite is wicked. I will recommend reading this book to anyone in security or otherwise interested in learning the "truth" about hacking and the underground.

Rating: 5 stars
Summary: An eye-opening look at our vulnerabilities.
Review: The information contained in Hack Attacks Revealed is an eye-opening look at how vulnerable companies are. By delving into the world of the hacker, it provides a unique view of what makes hackers tick, and ultimately how to better protect against them. This information along with the tools provided, make this a must have in your library.


<< 1 .. 23 24 25 26 27 >>

© 2004, ReviewFocus or its affiliates