Rating:  Summary: Good Primer Review: Hack Attacks revealed is a good starting point to understand the tools , methods and processes hackers use to attempt to penetrate networks. I would have liked to have seen more details on the descriptions of the attacks. I've just begun using TigerSuite to probe around on my network, but have to found of few of the tools to be quite useful already.
Rating:  Summary: Must Buy for Security Analyst newbies Review: Very well written technical book concerning Internet security and the inherent vunerablities of operating systems and the very structure of the Internet itself. Brings to light the tools and methodologies "hackers" use to locate, scan, probe, penetrate, and clear tracks on systems attached to the Internet and or to corporate LAN's. I use the term newbies, however, relatively speaking. To make the very most of this book and I HOPE this book's target audience being(security analysts/security enthusiasts), one should have a background in the C programming language, operating systems including but not limited to Windows and UNIX and detailed knowledge of the OSI stack coupled with intermediary network devices. To catch a thief one must think as a thief..., don't let this book slip through your fingers.
Rating:  Summary: A Book not to be missed Review: If you do not have this book you do not have all the information on the subject of hacking. a must for all administrators
Rating:  Summary: Getting my eyes opened Review: I am a fairly new person to the IT world and as I am in charge of a small network in my office. Thats what happens when you say yeah I know about computers and help out with a few things round the office but to cut a long story short i am now in charge of the exchange server and am getting virus and some strange mail comeng through on a regular baseis. Yeah being spoofed and getting loads of the sircran virus comeing through one though right what is the score with this virus crack and was recommended to John chirillo Hack Attacks revealed well me being a little slow in the world of virus and such like I really got my eyes opened to just what virus and trojons and worms were all about. Don't get me wrong we got anti virus software in place but now we got up to date anti virus soft ware and regular down loads of the dat files. Plus a decent fire wall in place so no more getting spoofed well not as bad as we were and no more virus. I was so impressed I have got the update to the 2.0 tigerbox and got hack attacks denied.If you want to know whats going on get this book and get your eyes opened to some well nasty things that a simple attachment could do to your office.
Rating:  Summary: Hack Attacks Revealed Review: I've purchased both of John Chirillo's books, "Hack Attacks Revealed", and "Hack Attacks Denied". I found both books to be substantive and informative, and both helped in my efforts to lock down several servers. If you really want to be a computer security expert it will of course take years of learning, but if you want a good head start these books are a great reasource.
Rating:  Summary: Hack Attacks - Great Reference Guide Review: We have added John Chirillo's "Hack Attactks Revealed" as an invaluable reference and training tool for our various teams here at Dallas InfoSecurity Group. A great tool that will compliment our other security reference materials. Waiting to see what improvements will be included in the next TigerSuite tools. Check it out.
Rating:  Summary: Start with this book-I have all three Review: If you haven't already then GET THIS BOOK! If you're not sure then GO PREVIEW IT AT THE BOOKSTORE!! This has everything, a must-have, must-read, security book including systems, software, hardware, routers, firewalls, and all the tools you need to do it yourself.
Rating:  Summary: Hack Attacks Revealed: A Complete Reference with Custom Secu Review: Very interesting book, gives a good overview of network security. Using TigerTools i was able to find 2 trojans on my computer, glad i got those caught.
Rating:  Summary: Understanding Hacking Review: To understand the hacker and the science of hacking the author provides a plethora of organized concepts Initially the book provides insight into various concepts of network technologies. This includes physical layers, networking layers, communication protocols, subnets, and computer ports needed to understand how the hacker functions. The book also contains a large appendix of reference materials including IP tables, ports and services, common virus, and codes. Mr. Chirillo provides the reader with an understanding of the mindset as well as the how's and why's of hacking. This provides a powerful tool in securing the network from intrusions.
Rating:  Summary: Hack Attacks Review Review: I like the information & how it was presented in the book. I am looking forward to trying the new software upgrade, as I had problems with the last version.
|