Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

List Price: $59.99
Your Price: $37.79
Product Info Reviews

<< 1 .. 6 7 8 9 10 11 12 .. 27 >>

Rating: 3 stars
Summary: Good Primer
Review: Hack Attacks revealed is a good starting point to understand the tools , methods and processes hackers use to attempt to penetrate networks. I would have liked to have seen more details on the descriptions of the attacks. I've just begun using TigerSuite to probe around on my network, but have to found of few of the tools to be quite useful already.

Rating: 4 stars
Summary: Must Buy for Security Analyst newbies
Review: Very well written technical book concerning Internet security and the inherent vunerablities of operating systems and the very structure of the Internet itself. Brings to light the tools and methodologies "hackers" use to locate, scan, probe, penetrate, and clear tracks on systems attached to the Internet and or to corporate LAN's. I use the term newbies, however, relatively speaking. To make the very most of this book and I HOPE this book's target audience being(security analysts/security enthusiasts), one should have a background in the C programming language, operating systems including but not limited to Windows and UNIX and detailed knowledge of the OSI stack coupled with intermediary network devices. To catch a thief one must think as a thief..., don't let this book slip through your fingers.

Rating: 5 stars
Summary: A Book not to be missed
Review: If you do not have this book you do not have all the information on the subject of hacking. a must for all administrators

Rating: 4 stars
Summary: Getting my eyes opened
Review: I am a fairly new person to the IT world and as I am in charge of a small network in my office. Thats what happens when you say yeah I know about computers and help out with a few things round the office but to cut a long story short i am now in charge of the exchange server and am getting virus and some strange mail comeng through on a regular baseis. Yeah being spoofed and getting loads of the sircran virus comeing through one though right what is the score with this virus crack and was recommended to John chirillo Hack Attacks revealed well me being a little slow in the world of virus and such like I really got my eyes opened to just what virus and trojons and worms were all about. Don't get me wrong we got anti virus software in place but now we got up to date anti virus soft ware and regular down loads of the dat files. Plus a decent fire wall in place so no more getting spoofed well not as bad as we were and no more virus.
I was so impressed I have got the update to the 2.0 tigerbox and got hack attacks denied.

If you want to know whats going on get this book and get your eyes opened to some well nasty things that a simple attachment could do to your office.

Rating: 4 stars
Summary: Hack Attacks Revealed
Review: I've purchased both of John Chirillo's books, "Hack Attacks Revealed", and "Hack Attacks Denied". I found both books to be substantive and informative, and both helped in my efforts to lock down several servers. If you really want to be a computer security expert it will of course take years of learning, but if you want a good head start these books are a great reasource.

Rating: 4 stars
Summary: Hack Attacks - Great Reference Guide
Review: We have added John Chirillo's "Hack Attactks Revealed" as an invaluable reference and training tool for our various teams here at Dallas InfoSecurity Group. A great tool that will compliment our other security reference materials. Waiting to see what improvements will be included in the next TigerSuite tools. Check it out.

Rating: 5 stars
Summary: Start with this book-I have all three
Review: If you haven't already then GET THIS BOOK! If you're not sure then GO PREVIEW IT AT THE BOOKSTORE!! This has everything, a must-have, must-read, security book including systems, software, hardware, routers, firewalls, and all the tools you need to do it yourself.

Rating: 4 stars
Summary: Hack Attacks Revealed: A Complete Reference with Custom Secu
Review: Very interesting book, gives a good overview of network security. Using TigerTools i was able to find 2 trojans on my computer, glad i got those caught.

Rating: 4 stars
Summary: Understanding Hacking
Review: To understand the hacker and the science of hacking the author provides a plethora of organized concepts

Initially the book provides insight into various concepts of network technologies. This includes physical layers, networking layers, communication protocols, subnets, and computer ports needed to understand how the hacker functions.

The book also contains a large appendix of reference materials including IP tables, ports and services, common virus, and codes.

Mr. Chirillo provides the reader with an understanding of the mindset as well as the how's and why's of hacking. This provides a powerful tool in securing the network from intrusions.

Rating: 4 stars
Summary: Hack Attacks Review
Review: I like the information & how it was presented in the book. I am looking forward to trying the new software upgrade, as I had problems with the last version.


<< 1 .. 6 7 8 9 10 11 12 .. 27 >>

© 2004, ReviewFocus or its affiliates