Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Maximum Security (3rd Edition)

Maximum Security (3rd Edition)

List Price: $49.99
Your Price: $24.99
Product Info Reviews

<< 1 2 3 4 5 .. 11 >>

Rating: 5 stars
Summary: This guy knows his UNIX...
Review: I have been a UNIX Administrator for more than 10 years. I have have worked for major banks around the world and always put my highest priority on Security. After reading Maximum Security (3rd Edition) I am a bit worried. I thought I had a firm grasp on UNIX Security...I have been proven wrong. This author goes into great detail and depth concerning the various vulnerabilities of a UNIX operating system. He covers the "basics" - mistakes an amateur administrator would make, as well as (what I call) "the epicenter" - vulnerabilities which can only be understood at the conceptual level. Since reading M.S., I have revisited my configurations and have found that I have left many, many holes unpatched. My employer and I thank you very much. I can't wait for the next edition!

Rating: 4 stars
Summary: Good place to start Hacking 101
Review: Maximum Security is one of those books that generate a lot of debate among readers. Business management types (AKA suits) would conjecture that the book is simply a nefarious cookbook for those who want a quick and dirty introduction to hacking and systems penetration. Engineers and experienced systems administrators would argue that the book is not deep enough for their needs. Both sides are right.

For the most part, Maximum Security is geared toward systems administrators who need to know how to secure their individual systems, but lack experience with information systems security. Those who are learning about information systems security and want to get their hands wet with hacking tools and concepts will find Maximum Security a good starting point. The book is an interesting read and has loads of information, including a plethora of links for further information. Each chapter lists many tools (both black, gray, and white hat) and additional resources for deeper information. But, those readers who want to understand how to design and engineer secure systems will likely find that the book does not meet their needs.

In Maximum Security, the author (Anonymous, with help from13 contributors) discusses an overview of systems security, and then describes the line of attack a hacker would use to penetrate a system. The downside to having so many contributors is that, with so many different authors, there is not a consistent style and methodology. (A similar title, Hacking Exposed has only three authors and a more methodical and systematic style). This lack of consistency between chapters is not a major concern when looking at individual systems, but when attempting to secure an enterprise with a single methodology, such an approach is often problematic.

The first three parts of the book provide a generic introduction to information systems security and the various threats and vulnerabilities associated with it. Parts four and five get into the nitty gritty of how attacks are carried out. The authors detail vulnerabilities and shortcomings of different types of systems, from firewalls and intrusion detection systems, to network operating systems (Solaris, Windows NT/2000, NetWare) and routers.

Chapter 20 provides a good introduction to the various issues with Unix security. While a lot of different topics are discussed (file system security, network services, host lockdown, and more), none of them are discussed in comprehensive detail.

Nicholas Raba, the author of Chapter 23 on Macintosh does a great job of destroying the myth of the presumed security invincibility of the Macintosh platform. Many people have the false assumption that the Macintosh is somehow more secure than Windows NT and Solaris. Raba astutely notes that for every hack that exists for the PC, there is an equivalent hack for the Mac.

CD-ROMs that accompany books are often of dubious value and only increase the cost of the book. However, the CD-ROM that comes with Maximum Security provides links, tools, and resources discussed in the book that are organized by chapter. It also contains over 25 different hacking and security tools.

One shortcoming of Maximum Security is that, although it provides hundreds of references and URLs, the reader does not come away with a clear understanding of the underlying techniques and methods necessary for the design and rollout of secure systems. The bulk of the book, with its underlying hacker mentality, focuses on security minutiae that make systems vulnerable. The book does not discuss high-level methods and strategies to resolve and ameliorate those security minutiae... Furthermore, Maximum Security does not get into the low-level programming details of how the described vulnerabilities work...Nonetheless, for those who want to experience the feel of hacking and use the tools that real-live hackers often use, Maximum Security is a good place to start.

Rating: 5 stars
Summary: Maximum Security
Review: Magnificent job on the books, each chapter taught me new lessons to secure our network! The authors of the book did an excellent job most definitely a top security book to be on everyone's book shelf. Great lessons and wonderful external resources.

Rating: 4 stars
Summary: Very good text book about network security
Review: The year 2000 was full of book releases in the area of network security. The reported hacker attacks and the loss caused by them made network administrators and home users worry about their system security. Far away from having an academic approach, the book Maximum Security shows practical examples of how to explore security holes in order to correct them. The book also covers attack techniques that have already been popular among hackers, allowing the reader to understand how an attack

happens and what the consequences of the principal attacks are. The reading is pleasant and the chapters are written in a way to make the content accessible to most users. The examples, captured screens and links available in the book complement the work, making it an excellent manual about network security.

Rating: 5 stars
Summary: Maximum Security
Review: ive been a hacker for years and this is the first book ive found that looks this far on the dark side of the fence! exellent reading

p.s Anonymous you said by the time you read this the 3rd edition will probably be out im sad to see its not been updated ;:?(

Rating: 5 stars
Summary: Excellent read
Review: I am a total novice to the subject of computer security. This book provides excellent general knowladge, that would have cost me a great deal of time and money to find elsewhere. It gives very concise detailed information on the subject and is money well spent!

Rating: 4 stars
Summary: for aris
Review: this is a bonus for my best friend

Rating: 5 stars
Summary: Maximum Security's Review by a 14 year old student.
Review: First I'd just like to say I'm 14, I've already worked at an ISP and a school fixing and troubleshooting computers. I just finished reading Maximum Security about a week ago and thought it deserved a good review. M.S. gave a detailed description of how intruders could get into your network,and how to stop them. It also gave you a library of info. on the programs and resources hackers use and a brief history of networking and the internet. So overall, Maximum Security was great and I think it should be read by every admin of a network or web site. ~Brett

Rating: 3 stars
Summary: Information contained is old but still worth reading
Review: I bought this book in 1998 and it was an instant knock out at that time. Being interested in hacking and security for a long time this book helped me alot especially the CD cotained some neat software. It also some email addresses for some nice security mailing list. But i think it would be better if they launch a new edition. The sequel to this books Maximum Linux Security ... is much better than this one. I recommend you read the later one.

Rating: 1 stars
Summary: OUT DATED
Review: OUT DATED! OUT DATED! OUT DATED!

DO NOT BUY THIS BOOK!


<< 1 2 3 4 5 .. 11 >>

© 2004, ReviewFocus or its affiliates