Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 2 3 4 5 6 .. 27 >>

Rating: 5 stars
Summary: Keep it up!
Review: These are excellent books. I thought myself quite knowledgeable about hacking until I read this and it's now a case of back to the drawing board as far as I'm concerned!!!! Keep up the good work!

Rating: 5 stars
Summary: The best single overview of the real-world security issues
Review: Blessed with an extensive index, excellent organization, and a successful visual design throughout, this book is a solid guide for learning via a banquet of multiple scenarios. It will discipline users to develop first-class strategies toward the ultimate goals of basic and enhanced network security hacking.
In short, a lot of this book may be hurried, but tolerably accurate. The truth is, if you are attempting to explain some of these topics to an individual of limited formal exposure and pressing professional need, there is no rational way to approach the task. So, if Chirillo seems to babble on occasion, it's because he has to satisfy readers' curiosities. There's a lot to cover and there's simply not enough paper handy.

Furthermore if you can think of the problem, this book probably has the solution--at least when it comes to PC and network security problems. This 1000-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of security woes, you will find pragmatic tips that can help you through an immediate crisis. And the configuration graphics, tables, and diagrams are both essential and useful additions to the text.

This is perhaps the best single overview of the real-world security issues that you'll find. And what makes the book particularly interesting is that Chirillo puts the various types computer cracking and hacking into the broader context of topics. In fact, it is hard to imagine how he was able to gather all of the incidents described and present them in a coherent manner that keeps you reading.

Rating: 4 stars
Summary: Preferance for this reference........
Review: I have recently purchased this book hoping to learn more about network security.......... i was not disappointed.
Before i purchased this book i bought the book 'Hacking exposed' but was disappointed to find that its content was aimed more at the intermediate to advanced security analyst. When i began reading 'Hack attacks...' i was pleased to notice that the book begins with an explanation of networks and network technologies written in such a clear and concise way that a total novice would have no problems understanding every step.
The book then continues to explain how these technnologies are used by hackers everyday and even provides all the tools necessary to experiance hands on the lessons that are to be learned from this book.
i would recommend this book to anyone who is atall interested in network security or is even curious as to how the internet works. I have shown this book to the administrator of my college network who was surprised at how much he didnt know.
I also recommend this book to budding hackers, for this book will take you on a journey from ignorant web surfer to powerful educated hacker.

Rating: 5 stars
Summary: Get a fighting chance.
Review: As a vocational educator (in a totally different field) and as a new system's administrator I would give Mr. Chirillo an "A" for educational style and content. Initially the book provides insight into various concepts of network technologies. This includes physical layers, networking layers, communication protocols, subnets, and computer ports needed to understand how the hacker functions. After reviewing the technologies of networking, the author progresses to methods used by hackers to uncover system vulnerabilities and methods of network disruption. Throughout the book are notes providing the author's insights and recommendations for further research. The book also contains a large appendix of reference materials including IP tables, ports and services, common virus, and codes. I really liked the way the author gradually imparts to the reader pertinent information by building on previous chapters. The system administrator with little or no hacking experience now has tools to discover and correct security problems. Mr. Chirillo gives the reader an understanding of the mindset as well as the how's and why's of hacking. This provides a powerful tool in securing the network from intrusions.

Rating: 4 stars
Summary: What you really need to know!
Review: This is a very good book though it is not geared toward newbies. It is very comprehensive and the software that comes with it is outstanding. Even if you are not very technical, the book combined with the software will enable you to learn a lot about how to hack and protect yourself from hackers.

Rating: 5 stars
Summary: great book
Review: i am very pleased with this book. with thousands of links and reference material, covering every topic loaded with hacks and cracks. great job!

Rating: 5 stars
Summary: Posted at school for Hack Attacks Revealed & Denied
Review: "Security breaches can and do come from anywhere. Competitors, spies, rogue employees, bored teens and even hackers are invading computers everywhere to make trouble, steal information and even sabotage careers. And with the growth of the Internet and World Wide Web, such actions become even easier. Server crashes, email loss, data loss, virus invasions, and other problems often go unexplained and network downtime eats up precious resources of time and money. How can these breaches be prevented? By knowing what to look for. The best way to beat a cyber criminal is to think like them to know what types of attacks they make, and how you can guard against them. Major Fortune 1000 corporations hire security expert John Chirillo to break into their networks and explore their vulnerabilities. Now, in his new books, he shares his security secrets and shows everyone from corporate network managers to concerned PC owners how to stop hackers in their tracks. His first book, Hack Attacks Revealed uses the philosophy that the best defense is a good offense to describe in detail the techniques and tools used by network hackers to exploit security loopholes and explains how they work. In this technogothic journey, you'll go inside the world of the hacker, allowing you to understand the hacker, think like the hacker, and ultimately, become the hacker. Chirillo illustrates the all techniques used by hackers, crackers, phreaks, and cyberpunks including discovery and scanning tools for hacking into known and unknown ports and services. The most unique feature of Hack Attacks Revealed is the powerful Tiger Box system, used by hackers to penetrate vulnerable networks and teaches how to customize the Tiger Box to use the same tool to your advantage. You'll find Tiger Tools 2000 and the TigerSuite on the bonus CD, along with links to over 15,000 security resources, viral kits, password crackers, and stealth scanners.

If Hack Attacks Revealed is the diagnosis, then Hack Attacks Denied is the prescription. In this book, Chirillo gives the step-by-step guidance on how to keep the hacks out of your network by using the same powerful Tiger Box® tools that hackers use to detect and penetrate network vulnerabilities. He covers all the necessary security steps from system to daemon and helps you tie the information together to create a highly effective security policy. The book doesn't simply reveal secrets of hacking but allows the reader to recognize the patterns of hacking and always be one step ahead of the hacker. The bonus CD included with this book provides detailed examples of making gateways and firewalls fortified against security breaches. You won't find a better treatment of the dangers posed by hackers and how to secure your organizations systems from harmful attacks. Whether you are a systems administrator, network engineer, security manager, consultant, or even just a hacking enthusiast, you can't afford to be without the need-to-know information in these books."

Rating: 5 stars
Summary: Read this book!
Review: I have recently completed a masters course in Info Protection and computer forensics and your book comes highly recommended and after readng it I know why. Thank you.

Rating: 5 stars
Summary: Review of a new thriller
Review: Until now, I have never avidly read a reference book like this before. As soon as I started on John Chirillo's book "Hack Attacks Revealed" I had great difficulty putting it down until I had finished. The insight into the furtiveness of the hacker's mind gives this book the feel of a thriller. This book should be compulsory reading for anyone who connects a company to the Internet. In excellent detail, the book describes the communication over networks using the Internet Protocol (IP) and goes on to provide an overview of the programming methods used by Hackers. This is backed up by an extensive encyclopaedia of known hacker's tools and methods. This book will leave you fascinated, horrified and primed ready to read the next in the series "Hack Attacks Denied" also by John Chirillo.

Rating: 5 stars
Summary: THIS BOOK ROCKED!
Review: I've never written a book review before, but here goes. If you were to walk into my room, you'd find a ton of books related on computer programming, engineering, graphic arts, networking, security, and the like. Out of all of my books, I must say that this book is one of the best. Although much of what the book talked about, I was already knowledgeable about, the information found in this book can be very helpful. If you're a beginner or intermediate in network and internet security or "hacking", this book is a very good book to start learning from. Even if you are more advanced, this book still has important information and can be used as a great reference material. The CD that accompanies the book has useful tools on it as well. Not only that, but the CD also has a HUGE list of websites for specialized tools, software, and information that's worth its weight in gold. Also, many of you people will probably be as suprised as I was, that if you have any questions or comments, if you go to the book's website and email them, you get a reply in at least a couple of days, and the service I recieved when asking my question was excellent. Overall, if you've been looking for a book in this field and want a smart choice, whether you're a novice or already consider yourself a computer hacker/cracker/phreak/admin, this book is a great buy. I hope the author plans on writing more books, because I'm definately prepared to buy them.


<< 1 2 3 4 5 6 .. 27 >>

© 2004, ReviewFocus or its affiliates