Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 2 3 4 5 6 7 .. 27 >>

Rating: 5 stars
Summary: You'll go back time and time again
Review: It was good to see another book on the market that someone has taken a lot of time searching the net for the latest information for the IT/Fraud/Security managers of the world. The book goes into a lot of detail about the different risks involved in the IT security industry, if you are new to the industry then this is a must, don't be disappointed about this book, it will always be a book that you will go back to time and time again.

Rating: 5 stars
Summary: Top Notch
Review: These are without a doubt the best books on the subject I have ever read; clear, concise, inciteful descriptions of every aspect of the field of computer security. If you were to buy one book on the subject, buy Revealed (and if you were to buy two, buy the sister to this book, Denied!)

Rating: 4 stars
Summary: Excelent resource for the security professional
Review: Like it or not, the world as we knew it in the IT field is changing rapidly. Computer and network attacks are almost as common as the cold today and most people are completely unaware that they were victimized. The best defense in this environment is a knowlege of the attacker. Knowlege how the attacker thinks, the tools they use and the techniques they use is your ticket to providing a secure environment at work and at home. John does a fine job in profiling the different types of attack and exploits offering advise on sealing these holes and provides some tools you can use to test the integrity of your network and computer systems. Definately something you want to keep handy in the event you are tasked with investigating an incident.

Rating: 5 stars
Summary: Revealing Hack Attacks
Review: I have been working in the world of IT for years, but was shocked at the other world thjat exists. The book really opened my eyes to what can be done, often without the slightest inclination of a PC user or company.

The book has proved both enlightening and as a source of info for securing my own network and carrying out security tests on it.

Anyone that thinks they know what goes on, should read this book and find out the gaps in their knowledge may be huge.

I have recommended this book to several friends and associates, all of whom have been dumbstruck at the potential out there.

A must have for any IT auditor, network administrator, home user or any IT professional

Rating: 5 stars
Summary: Very good hands-on book on hacking
Review: Provide with a CD-Rom, this book is the lastest of the series of book on hacking by the same author. John is good at presenting the idea clearly with lots of example and demonstration. If you would like to gain a practical knowledge on hacking delivered by experts, this is one of the best. I specially like Chpater 7 for the hacker coding fudamentals where I can find basic programming knoledge on how to build hacking programs.

Don't forget trying the tools in the CD-ROM !

Rating: 5 stars
Summary: BUY THESE THREE BOOKS
Review: I was only going to buy one book, but after reading some of each I couldn't wait and got all three. This is an investment in your learning that will pay off many times over.

Rating: 5 stars
Summary: one of the best books I've read
Review: This book is just amazing. It takes you from the basics of explaning the address alocations to high level atacks like spoofing. It does describe procedures and it does tell you "why" not only "how". Author analyses a large number of holes, gives a very good lessons in programming.A very good collection of tools is also included with a book. I'm sure, those who can distinguish top level books, will apreciate this one, those who thinks that online tutorials, reading of news groups etc. can educate them better will change their minds. To be short, it is a must for anyone, who is interested in information security.

Rating: 5 stars
Summary: Don't hesitate
Review: I was reluctant at first to buy this book. After reading a few chapters at the bookstore, I fessed up the cash. With so much information, I'm at a loss of words. Chirillo did an EXCELLENT job with the learning primers and the tons of security exploits.

I guess just like all things in life, with this book you get what you pay for.

Rating: 5 stars
Summary: Well-written and comprehensive
Review: Excellent very well-written and comprehensive look at hacking today. In the future, I hope to see more books by this author.

Rating: 5 stars
Summary: very happy customer
Review: i could use many examples in this book. i have started in the internet security field and found this to be a great help.


<< 1 2 3 4 5 6 7 .. 27 >>

© 2004, ReviewFocus or its affiliates