Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 2 3 4 5 6 7 8 .. 27 >>

Rating: 5 stars
Summary: Impressive work
Review: The author has written an excellent set of books. The organization and content lend to a superior training manual for the security consultant. I was very impressed with the chapters concerning specific breaches and source code examples. Mr. Chirillo should be applauded for the completeness of his work. While new exploits appear on a daily basis, John has given the reader sufficient links to online resources to remain current. My firm is requiring that Mr. Chirillo's books be read by all persons who will be performing any security work for our clients. I look forward to any further publications from John and would like to meet him in the future.

Rating: 5 stars
Summary: excellent
Review: teach everything you need to know about the basics to the advanced. even though you may already know something of the subjects, you will find out things that will amaze you. provide excellent methodologies about hacking and teach how it is more important to understand the way hackers think, then to rely on incomplete security tools.

Rating: 5 stars
Summary: most comprehensive references
Review: At first I thought, "yeah right, another security book (yawn)." Even then I waited a week before reading the manuscript. Boy was I wrong, this is one of the most comprehensive references to date! Well over 800 pages of details, both technical and informational. Tigersuite is wicked. I will recommend reading this book to anyone in security or otherwise interested in learning the "truth" about hacking and the underground.

Rating: 5 stars
Summary: you NEED these books
Review: In Hack Attacks Revealed and Hack Attacks Denied, John Chirillo has produced nothing less than a tour de force in the field of networking and network security. I had the priviledge of working with the author and both of these remarkable books before publication. When I first started reading Hack Attacks Revealed, I was fascinated with the material presented; by the time I finished, I realized that it was more than fascinating stuff--it was a chilling reminder of our vulnerability. If you--like me--are interested in all things technical, you will find these books a wonderful treasure box of information. If you are an Information Systems professional, and hope for continued employment in your chosen field--you NEED these books.

Rating: 5 stars
Summary: A must have!!
Review: I have read or own just about every security book out there and have to say that this book is concise, to the point, and informative. It is a must have for anyone that wants to learn about security, and more specifically hacking to find holes and weaknesses and then securing them.

Rating: 5 stars
Summary: Awesome detail
Review: The software is awesome! The parts of the book I read soe far were similar to my other favs like Exposed and Proofing but had much more detail with better examples as well as hacks I've never seen in any other book.

Rating: 5 stars
Summary: an absolute must have
Review: whether you are already knee deep in network and system security or are just starting out with an interest in how security works, this is an excellent learning tool. i thought the book was well written as well as relevant, and really gave an all-around look at security today.

Rating: 4 stars
Summary: Great overview of Vulnerability tools and how to use them
Review: In Hack Attacks Revealed, John Charillo covers alot of the types of tools hackers use to compromise a system. This book comes with a CD with examples of some of the tools he talks about. This is a good book for the experienced Security Professional and the beginner. He explains what to expect from certain tools and how to use them, but does not really talk about scripts, and specific buffer overuns and specific code. This is a great overview and should be a must have to compliment Hacking Exposed.

Rating: 4 stars
Summary: "Hack Attacks" Reveals inner world
Review: "Hack Attacks Revealed" is a must read for system administrators or anyone responsible for managing security for their network or computers. It provides an easy to read guide to how attacks are launched, includes plenty of code examples and reveals many of the general attack methodologies used by today's hackers.
While the book alone will not make anyone a security expert, it is certain that novice and experienced security professionals will find something new to learn within its pages.

Rating: 4 stars
Summary: Interesting
Review: I have read both of these books. They are very educational to any one who wishes to find out more about the threats that are out there in the wild.

Excellent read for the person who wants to learn more about the posibilities of the connected box.


<< 1 2 3 4 5 6 7 8 .. 27 >>

© 2004, ReviewFocus or its affiliates