Rating:  Summary: You'll go back time and time again Review: It was good to see another book on the market that someone has taken a lot of time searching the net for the latest information for the IT/Fraud/Security managers of the world. The book goes into a lot of detail about the different risks involved in the IT security industry, if you are new to the industry then this is a must, don't be disappointed about this book, it will always be a book that you will go back to time and time again.
Rating:  Summary: Top Notch Review: These are without a doubt the best books on the subject I have ever read; clear, concise, inciteful descriptions of every aspect of the field of computer security. If you were to buy one book on the subject, buy Revealed (and if you were to buy two, buy the sister to this book, Denied!)
Rating:  Summary: Excelent resource for the security professional Review: Like it or not, the world as we knew it in the IT field is changing rapidly. Computer and network attacks are almost as common as the cold today and most people are completely unaware that they were victimized. The best defense in this environment is a knowlege of the attacker. Knowlege how the attacker thinks, the tools they use and the techniques they use is your ticket to providing a secure environment at work and at home. John does a fine job in profiling the different types of attack and exploits offering advise on sealing these holes and provides some tools you can use to test the integrity of your network and computer systems. Definately something you want to keep handy in the event you are tasked with investigating an incident.
Rating:  Summary: Revealing Hack Attacks Review: I have been working in the world of IT for years, but was shocked at the other world thjat exists. The book really opened my eyes to what can be done, often without the slightest inclination of a PC user or company.The book has proved both enlightening and as a source of info for securing my own network and carrying out security tests on it. Anyone that thinks they know what goes on, should read this book and find out the gaps in their knowledge may be huge. I have recommended this book to several friends and associates, all of whom have been dumbstruck at the potential out there. A must have for any IT auditor, network administrator, home user or any IT professional
Rating:  Summary: Very good hands-on book on hacking Review: Provide with a CD-Rom, this book is the lastest of the series of book on hacking by the same author. John is good at presenting the idea clearly with lots of example and demonstration. If you would like to gain a practical knowledge on hacking delivered by experts, this is one of the best. I specially like Chpater 7 for the hacker coding fudamentals where I can find basic programming knoledge on how to build hacking programs. Don't forget trying the tools in the CD-ROM !
Rating:  Summary: BUY THESE THREE BOOKS Review: I was only going to buy one book, but after reading some of each I couldn't wait and got all three. This is an investment in your learning that will pay off many times over.
Rating:  Summary: one of the best books I've read Review: This book is just amazing. It takes you from the basics of explaning the address alocations to high level atacks like spoofing. It does describe procedures and it does tell you "why" not only "how". Author analyses a large number of holes, gives a very good lessons in programming.A very good collection of tools is also included with a book. I'm sure, those who can distinguish top level books, will apreciate this one, those who thinks that online tutorials, reading of news groups etc. can educate them better will change their minds. To be short, it is a must for anyone, who is interested in information security.
Rating:  Summary: Don't hesitate Review: I was reluctant at first to buy this book. After reading a few chapters at the bookstore, I fessed up the cash. With so much information, I'm at a loss of words. Chirillo did an EXCELLENT job with the learning primers and the tons of security exploits. I guess just like all things in life, with this book you get what you pay for.
Rating:  Summary: Well-written and comprehensive Review: Excellent very well-written and comprehensive look at hacking today. In the future, I hope to see more books by this author.
Rating:  Summary: very happy customer Review: i could use many examples in this book. i have started in the internet security field and found this to be a great help.
|