Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 3 4 5 6 7 8 9 .. 27 >>

Rating: 4 stars
Summary: Excellent
Review: This book will not only teach you attacks that black hatters will try on you but it gives you the knowledge that is needed to secure your network. As net admins know, security is an on going process and this gets you a good start.

Rating: 5 stars
Summary: Tom's review
Review: Bravo! Excellent book. I found the book extremely helpful. I've attended several security seminars, including those at CSI and book provides a concise, easy to read and search means of reference and the valuable tools on the CD are extremely useful.

Since one of the WANs that make up our campus network are within dormatories and I constantly have to check for problems both from the inside and the outside, I am always searching out new information and tools that make the job easier.

Rating: 4 stars
Summary: comprehensive, good format.
Review: I'm a comp sci major and as such I encounter a variety of people with various levels of computing experience daily. I deal with those people who agree that "the hardest class we will ever take in undergraduate school" (as the TA said about second semester programming with c++) is cake (ohh no, not multiple inheritance & polymorphism, anything but that!). But then there are those people who can't write a friend function, yet read Just Enough Unix & visited the happyhacker (happyhacker.org) website and now think they're Uberhackers....mostly cause they saw the movie (Hackers, not War Games). Anyway, after reading this book I recommended it to a group of people consisting of both types. The first several chapters put the Uberhackers to sleep (but at least they were able to skip ahead & download some great trojans from the websites listed in the repository on the CD), while the rest of us ate em up. Personally I learned more about the protocols that keep the internet running from the first 100 pages of this book than I did from several other sources including the text book of a "comprehensive" undergrad networking class. The downside is now I know enough not to look forward to wasting credit hours on that class (gotta take it though).

My favorite chapter was the chapter on C programming. Its a great primer written in a no-nonsense, yet not as dry as an RFC style. Personally I think the problem with most books today is the three pages of padding for every page of useful information (highly evident in books such as Mastering Red Hat Linux 6. The book made me switch to Debian). This book doesn't have that problem, yet it provides the effect that the padding and wouldbe humor try to via an ongoing biographical sketch of the author's early experiences in computers & hacking. The story is contained in special chapters throughout the book at intervals perfect for giving my mind a rest; yet they are easy to skip if you're one of those super genious types who can input an infinite amount of stuff wihtout a headache.

Truly the only downside of the book is the Tiger Tools toolkit. The scanners are really fast, but (in the windows version at least)individual software modules crash, won't close, won't stop scanning or start a new scan after completing a previous one without restarting the TT suite, etc. In short they are highly unstable and can be a real pain in the but...but they are fast. And to the author's credit, he is realeasing a new version of the suite soon, though I'm not sure if these issues have been addressed. BTW the rest of the CD is great as far as content is concerned. It'll keep you reading forever.

Rating: 4 stars
Summary: Hack Attacks Revealed
Review: John has done an outstanding job of describing hack attacks from the hackers point of view. The result is a book that provides insight into not only the means that hackers use, but their strategy for hacking your system. His narrative, combined with the included tools, provide an outstanding defense against hackers.

Rating: 5 stars
Summary: GET THIS BOOK! IT"S FANTASTIC
Review: I'm a Adjunct Professor of eBusiness at the Kelstat Graduate School of Business at DePaul University and I do teach internet security in my classes. I've often used the contents of this book to instruct my MBA students in various aspects of web security and vulnerabilities. It's a good book, get it and read it.

Rating: 5 stars
Summary: Good choices
Review: Good choice. It teaches everything you need to know about the basics to the advanced hacking. You will also find out key points from hacker notes. These books provide excellent methodologies about hacking and teach how it is more important to understand the way hackers think, and then how to secure against them.

Rating: 4 stars
Summary: Great book
Review: This is a great book, covering all aspects of computer hacking. Includes source code examples of various hacking techniques.

Rating: 5 stars
Summary: Read them
Review: These are good books and I emplore anyone to read them. The chapters on security go in depth. They also show you a lot of screenshots from hackingtools which are actually in use. And the cd-roms are also nice because of the hacker toolkit.

Rating: 5 stars
Summary: Great Book
Review: A good book, and I find myself referring to it often. I have learned much.

Rating: 5 stars
Summary: Understandng Hacking
Review: This book gives an excellent overview of hacking and how a typical hacker may be exploiting the weaknessnes in the system. This books provides good introduction to beginners but is equally good reference for experience systems pros.


<< 1 .. 3 4 5 6 7 8 9 .. 27 >>

© 2004, ReviewFocus or its affiliates