Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Maximum Security (3rd Edition)

Maximum Security (3rd Edition)

List Price: $49.99
Your Price: $24.99
Product Info Reviews

<< 1 2 3 4 5 6 7 8 .. 11 >>

Rating: 4 stars
Summary: Good purchase, improved over the first edition, but bad CD
Review: Either reader flak from the terrible previous edition or the author's conscience catching up to him brought about this much improved second edition. I had written off Anonymous as yet another sellout-apparent-self-called "security expert" milking the InfoSec cash cow two years ago, but this latest install is a grand step up from the previous Maximum Security and the author has done a decent bit of work.

This book is a worthy addition to your bookshelf if you are in any way involved with computer security. If you are completely unknowledeable in the field, this book will bring you up to speed on general security history/principles and give you a plethora of resources for educating yourself even further. Actual security conscious admins may just wish to breeze through this, but keep it handy as a reference for the new guy in your section that doesn't have the faintest clue as to what computer security is.

Granted, much if not all of what is put forth in this book can be found on the Internet these days, but I find this book to be an indispensable "bookmark collection" of sorts. In addition to its ability to clearly define much InfoSec terminology in a way that is easily passed on to "users", Maximum Security can best be described as a "stepping off" platform for those that want to be fed the basics quickly, and then nudged in the right direction.

It's not all good, though. The CD that accompanies this book is practically worthless and pales in comparison to the previous edition's CD which wasn't much better. I didn't think they could make a worse CD than the first edition's, but somehow, they did. The one key feature of the CD that is "glorified" in the book by the author (a list of ALL the hyperlinks in the book, links to all the RFCs, and MS security advisories) isn't even ON the CD (eventually it was put out as a download from SAM's support site)! I KNOW that a better resource CD could be made in a matter of DAYS--it is a shame so little effort was put into the one with this book.

It's also important to note that this book fails to properly mention many new security tools and the explosion of Linux in particular-but this is to be expected from a book attempting to generalize such a dynamic field. And of course, the author will soon be releasing a "Maximum Linux Security" book--nice PR touch there.

Overall, this book is a worthy buy. But make sure you follow it up with a healthy learning initiative and catch up with the current state of the computer security field. And when you get this book, immediately throw the CD in the trash or use it as a drink coaster. ;)

Rating: 2 stars
Summary: not thorough enough
Review: Not too bad for a *basic* introduction to security, but certainly not rigorous enough to secure a network. While Sams considers this an "advanced" topic (from the cover), the author "anonymous" gives only a superficial glossing over of the subject. It's a script kiddie's intro to hacking, in the same vein as Meinel's [poorly constructed] book.

What I'd really like to see is a comprehensive discussion on the strategies and methods employed by intruders, with code examples and thorough explanation of common techniques (e.g. buffer overflows, detecting sniffers, common code/scripts to detect SUID changes, etc.). This book merely says "buffer overflows exist", when it should describe how to evaluate code to prevent overflow attacks. More forensic topics are required as well, for "post-mortem" analysis after a breakin.

Rating: 4 stars
Summary: Great!
Review: I got this book to learn more about network security. This book is the "starting" HOW-TO to network/internet security. It's nice to have some background with networks & tcp/ip before reading this but I think most people with some computer background will get the picture.. I would say READ IT to anyone that want's basic network security understanding and wants something to give them the path!!

Rating: 5 stars
Summary: Excellent book!
Review: I'm a student for computer ethics and I'm kindaz intersted in computer and/or internet security. And all I ever wanted to know (even a lot more!) is right here is this book. So, whoever who wants to know the innners and outs from their system, read this book

Rating: 5 stars
Summary: The Undefeated Champion of all
Review: The book is the greatest, most usefull security handbook there is. The old adage "If you can't beat them, join them" is applicable here, Anonymous was one of "them" and now, with his help, you CAN beat them. (Or, worryingly easliy, join them)

Rating: 5 stars
Summary: The most complete and informational book.
Review: This book is a must get for system admins. This book does not only demonstrate protecting your site in various ways,it also includes key concepts about linux/unix and other operating systems.thus,making you more knowledgeable and have more confidence on protecting your site and network.i recommend this book for people who want to protect there site and network and also learn new things about the wonderful world of the world wide web.

Rating: 5 stars
Summary: good book
Review: I have seen the first version ,but I think this version is better,so I give it 5 stars.it had a lot of info i need,I like it.the book is good and i give it 5 stars.Well I do not think any book has everything though.

Rating: 5 stars
Summary: Untouchable
Review: Thanks to this book, my site has been untouchable. It has made me a better sysadmin and I know what to keep my eyes open for now! Keep up the good work! Hackers protecting Hackers!

Rating: 5 stars
Summary: A very good overall overview of security
Review: What's cool about this book is that it talks about all different operating systems, including UNIX, NT, MacOS and VMS and it talks about the different hacking/cracking/security utilities avalible. It also illustrates how different holes can be exploited and even gives some insight on some recent and not so recent hacker/cracker history.

Rating: 5 stars
Summary: Much better than the first
Review: I bought this book because I read the first book and looked through the first chapter. It said it would be better than the second one (in a variety of ways, but mostly content) and more like a sequel. Oh, and for those of you who griped about how it turned you to internet documents: you are morons! Internet Security is rapidly changing, and is very much like medicine: No one book can teach you everything you need to know! And you still have to take the responsibility of keeping up with the progress of your industry. I recomend that everyone visit a book store personally and reading the first chapter of a computer book they are thinking about buying and seeing who the target audience is. As this book clearly states:

"... I wrote this book for the following reasons:
* To provide inexperienced users w/ a comprehensive source about security
* To provide system administrators with a reference book
* To heighten public awareness of the need for adequate security"

Now then, this book is great and it provides information for almost any kind of Operating System and vulnerable programs. This book is a must as an INTRODUCTORY book for anyone interested in computer security.


<< 1 2 3 4 5 6 7 8 .. 11 >>

© 2004, ReviewFocus or its affiliates