Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit |
List Price: $59.99
Your Price: $37.79 |
 |
|
|
Product Info |
Reviews |
Rating:  Summary: A great companion to any network security engineer Review: I have read this book cover to cover twice. I found it enlightening and thoroughly engrossing. I function as a wide area network engineer, and as such I am usually the one called on to review or implement security, especially at the perimeter. I must admit I was a bit lost with regards to the C code dealt with in the book, not having a programming background, but all in all I was able to take a lot away from the book to incorporate in to my day-to-day activities. I especially liked the Tiger Tools CD, and I purchased the full version online. I use many of the tools, however I wish there was a little more info on incorporating pre-written scripts into some of the breachers and penetrators. I will look for John's next book eagerly.
Rating:  Summary: great book Review: The author does a great job of taking complicated material and maiking it easy to follow for advanced, and not-so-advanced readers.
Rating:  Summary: nothing else comes close!! Review: if your momma ever taught you anything, then get yourself this book. nothing else comes close to a complete infsec reference. i saw the reviews in 2600 and SC and had to get me a copy. at the store i saw the other two books and got all three. didnt plan on spending as much but its worth it for this series.
Rating:  Summary: The new hacker bible. Review: This book takes you step by step and shows you all the different insecurities one after another in depth of each one. The CD that came with the book has tools to see how easy it is to "Crack or Hack into" our own site and into some files that I had passwords. Thanks John Chirillo
Rating:  Summary: Best overview of real-world info security. Review: This is the best single overview of the real-world security issues that you'll find. And what makes the book particularly interesting is that Chirillo puts the various types computer cracking and hacking into the broader context of topics. In fact, it is hard to imagine how he was able to gather all of the incidents described and present them in a coherent manner that keeps you reading.
Rating:  Summary: Reference Into Prodigy Review: Most of the security problems we fear are creatively illustrated in this up-and-coming blockbuster. Although I'm partial to operating systems, I focused my attention on port, socket and service vulnerabilities. In short, the example cases were nothing less than informative, and shocking. What would typically fall short of boring, the 80-page internetwork tutorial from a hacker's perspective was technically refreshing. The companion CD was all that the book said it would be, and more. Although some of the links in the Tiger Tool Repository are dead, the 14,000 or so valid resources are critically valuable for any user. Overall the best part about Hack Attacks Revealed is the down-to-earth, layman style the author uses to keep my attention.
Rating:  Summary: Great reference! Review: As a security-conscious computer user, I found this to be an excellent primer for understanding strategies used by hackers to exploit innocent web browsers. After converting to cable modem, with an "always on" connection, I realized (through firewall alerts) how many people out there are scanning the internet for vulnerable computers. This book is incredibly informative and very readable for lay persons (i.e. non-network administrators or security professionals). The section describing computer ports was fascinating, especially the "Hacker's Strategy" comments. And the accompanying CD alone is worth the price of the book! A must-have for us computer users interested in protecting ourselves from would-be hack attackers!
Rating:  Summary: Very good book Review: I have 3 years in IT security and I found this book helpful. It gives information for secutity holes in the most known products.The only think that I didn't like is the big C codes examples but this could be useful for many people interested on programming for security with C.
Rating:  Summary: Hack Attack Revealed and Hack Attack Denied Review: All, I have enjoyed this series of books very much. I am very impressed at the detail but at the same time it lends it's self to the non-security professional. The is a great deal of information to be had and learned in these books. One must read both to fully understand both aspects of the trade. The expoits and the solutions both must play a key role in ANY security posture for even the simplest networks connected to the Internet. I have also enjoyed using the TigerTool kit version 2.0. I bought the full version as I am very familiar with many of the tools provided for both NT and the Unix environment. Good luck on futher endevors.
Rating:  Summary: You can dig down into security with this book! Review: I have never seen, heard, learned, or used such a book. It could let you dig down very deep, however, you would never realize how deep you come down. I bought it because I thought I would learn what does typical hacker does.
|
|
|
|