Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Maximum Security (3rd Edition)

Maximum Security (3rd Edition)

List Price: $49.99
Your Price: $24.99
Product Info Reviews

<< 1 2 3 4 5 6 .. 11 >>

Rating: 4 stars
Summary: Recommended reading, but avoid the laundry lists
Review: I am responsible for a 50+ person intrusion detection mission, and I do recommend this book to my analysts -- but only after "Hacking Exposed," "Network Intrusion Detection," and "Core Internet Protocols." The first edition of this book caused quite a stir in the community, which may have been the greatest contribution made by the Anonymous author. Many other books explaining security and vulnerabilities followed, backed up by corporate-like public resources, like SecurityFocus.com. Now that security professionals are relying upon public databases, and tend to share information more freely, it's not necessary to spend lots of time reading specific vulnerability descriptions in "Maximum Security." I still appreciate the author's candor and courage. I look forward to the third edition, which will hopefully spend less pages cataloging exploits, while still explaining the root causes behind them.

Rating: 3 stars
Summary: Maximum Security : A Sysadmin's Perspective
Review: Being both a hacker and a Sysadmin (no my boss doesn't know and never will) I read this book with pleasure. It offers a good perspective on the basics of The Deed. Although I must admit, that it wouldn't be a top-shelf-starting book on hacking. It is written primarily for the admins. The information and software in the book is somewhat outdated; what is so good about this book is that is lines out basic defensive measures that any of my fellow sysadmins can grasp and carry out. These are timeless; as is the awareness it will probably give them about their position in this world. Was very amused about the Microsoft-section! If your company is based on NT, and you feel fine about it, get this book QUICKLY. And pick up a copy of Novell for Dummies on your way. For the fellow Haxors: Don't buy this book. The Phracks, the Technicals on Blacksun, or the hackers.com archives will give you much more info than these books might ever provide you with.

Rating: 4 stars
Summary: what about the secret message about the internet?
Review: i would really like to know if anyone ever figured out the secret message hidden in the cd of the first edition of this book. did anyone ever figure out his code? here are my guesses:

first field: the dimensions have to deal with the base of the great pyramid. 755 is the length of one of the sides, and since there are four, that is why there is 4X755. the 230.4 is the metric equivalent of that number, but i do not know what that means.

second field: abydos could have something to do with the place in egypt, but i think there is something else about it. maybe something about denial of service or disk operating system, but i feel there is something deeper to it than the burial place of rameses.

third field: already told by the author

fourth and fifth fields: these seem to be related, but they could be meant to look that way. i do not know what they could mean, perhaps times, perhaps bible verses (revelation 13:17 has some interesting stuff about the name and number of the beast-satan666?), or do the numbers have something to do with the maximum security book itself (the author said there are many secrets hidden within his book, if i remember correctly).

so someone, anyone, what is the secret message about the internet?

infinitii@hotmail.com

Rating: 4 stars
Summary: A hacker anatomy.
Review: Well, this book is a shock if you believe you are qualified professionals in security. Seasoned professionals may be a little annoyed knowing that stuff. If they had a measure, we have to build a countermeasure. We are back to Cold War era. At least, we have a lot of stuff to study and devise a set of policies and procedures to take in order to make our sites more secured.

Rating: 5 stars
Summary: Comprehensive Protection
Review: This is one of the most comprehensive yet clearly written guides to protecting network data. Over 800 pages of detailed information include explanations of network "Hacker" terms, latest tools to protect ourselves and organizations that offer further training. Required reading for anyone associated with network security.

Rating: 4 stars
Summary: A good stuff for the beginners
Review: i am a security analyst with a dot com company.what this book can do is to tell you what the hackers have done in the past.i feel that is quite enough for the beginners.Please don't give 'em any more ideas.that would be nightmare for people like me.

Rating: 1 stars
Summary: out of date
Review: Most of Information is old and can be collected from various Sites/Documents. Most of suggested Utils are out of date. Good Start for Newbies, worthless for people with experience in Network Security.

Rating: 5 stars
Summary: An informative interesting mustread resource
Review: This book is interesting and informative. it provides information about mac, unix, and windows platforms and is incredibly revileing. If gives information about what are secure services, servers, platforms. It uses the approach of cracking your own server to protect it. it also makes for interesting reading, a little humorous. Must read.

Rating: 2 stars
Summary: Good only for absolute beginners....
Review: Well everyone is "downing" this book, and yes its outdated a good bit ( by the time ANY computer book thats written is actually printed and hits store shelves it is outdated)but I think that anyone who wants to start learning can get quite a bit of information from it. A lot of good hacker history is presented in this book and it does cover the basics well. HOWEVER...I would reccomend the two following books as companions to this one: Sam's teach yourself networking in 24 hours, and Sam's teach yourself tcp/ip in 24 hours. Buying this book will not make you a "hacker" overnight...in fact nothing can do that. Either you have "the touch" or you dont. But anyone can learn, and after all that is what it is all about. And you can learn a good bit from this book if you are just starting out.

Rating: 1 stars
Summary: Trees died for this?
Review: How can this book be the end all of network security? After hearing the reviews I picked it up. What a mistake. How can the people who wrote the great reviews claim to know anything about well... anything. I will admit Mr./Mrs. Anonymous knew how to use lingo he/she found on the net. If you are a network security type or a rooter do not waste your money on this. I honestly believe that the author purposely wrote the book anonymously just to sell copies. One word... overflow... not even mentioned... anywhere. You can get more out of the man pages.


<< 1 2 3 4 5 6 .. 11 >>

© 2004, ReviewFocus or its affiliates