Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Maximum Security (3rd Edition)

Maximum Security (3rd Edition)

List Price: $49.99
Your Price: $24.99
Product Info Reviews

<< 1 .. 5 6 7 8 9 10 11 >>

Rating: 5 stars
Summary: This thing will teach u all u need to know about hacking.
Review: I think out of all the books I'd review on computing and hacking - this is the one that will guide u from being a newbie to being a 'leet hacker ;)

I like the step by step guides on each of the hacking techniques. As for the people below that say, "Theres not enough on hacking from Windows", well you cant hack from windows anyway, you need to get more powerful stuff and set up to dual boot as Linux.

Summary - this is the 'secret' book that'll teach you what u want to know about hacking (even if that was not the books purpose ;) )

Rating: 4 stars
Summary: Very Informative!
Review: This book covers a broad range of security topics, including some that are well known and documented and some suprises in between. A great single-volume reference for anyone new to the field.

Rating: 5 stars
Summary: Read it Carefully = How to hack
Review: I'm not sure what's happening here... this book is a set by step guide on how to hack each operating system.

If there are people who are learning 'hacking' like myself, this thing would teach you what you need to know, but you'd have to read it carefully as it seems to look at every technique on earth to break into stuff.

So I agree, this would be the standard recognized 'hacking textbook' as they say... but it would also be good for established hackers to use as their major reference book when they are going thru the steps of remotely getting access.

Summary: probably _the_ central book in the 'essential hacker's reference library'. After this book, get the book on catching Mitnick, perhaps The Happy Hacker (if you are a real green newbie), and you are set.

Rating: 4 stars
Summary: Good book to begin with
Review: If you are starting to get interested in network security, this book is a good guide for those who have never thought along these lines before. Interesting read, lots of information, if you follow all the links, you could become close to an expert. There were several gaps, mostly in true PC networking, it was somewhat strong on the Unix side. It was sort of an insight to the mind of a cracker. One questions the author though, if he was a true hacker and not a cracker, why remain anonymous. If he was a cracker, why not tell us so that we could have a stronger idea of what a cracker thinks. Some good references to tools used in the industry, but overall this book is not the be-all-end-all of network security. The CD that comes with the book is mostly useless, but then aren't they all?

Rating: 4 stars
Summary: This was a good book but can leave you hanging confused
Review: This book is a great book to learn some of the basics but don't expect to be an elite hacker after reading this book, this had good resources and I would recommend this book to some of the newbies.

Rating: 2 stars
Summary: A book for absolute beginners
Review: This book won't teach you very much if you're not a newbie to computers and computer security. The author writes over 900 pages, but hardly say anything useful.

Rating: 5 stars
Summary: If you don't like it, what do you recommend?
Review: I needed help setting up and understanding firewalls pronto. This book pointed me in right direction. As a bonus, it was just plain fun to read and I was able to look past the technical problems. If you are a sys admin, buy it and enjoy.

Rating: 5 stars
Summary: A very friendly and nice book.
Review: Definetely this world and its diversity fascinates me. Some people may don't like this book, but I tell you, it's the most friendly and easy to read book i've ever bought. It became a good company and it has enriched me a lot in general and specif knowledge of "how" things work over the net. A must for those interested in both sides of the life in the net...and those who can make their choices of which path to follow. The author has made his choice...have you ?

Rating: 5 stars
Summary: Conception Is Key.
Review: Like all great generals say, you must know your enemy well. Despite it's some what aged demeanor this book gives valuable insights to a seldom seen and virtualy non-published realm. Many Computer Forensic technicians will still find this a welcome addition to their library. You'll learn how to pick out Social Engineering tactics, brute force, and Network Hi-jacking techniques. You will find that these crafty people will dig through trash and read your company training manuals to gain insight into what operating systems, terminal emulation, IP Subnets, and default passwords you use, all with out entering your work place. Delving into an arena so differant from the normal drab "Married With Children" mentality was quite refreshing.

Rating: 5 stars
Summary: Knock it all you want, still worth its money
Review: Ok, some people said it, the book isn't perfect in an absolute sense. But compare it with other books out there and it's clearly the most real-world reference. Most NT security books merely echo Redmond's news releases and material readily (and free) available on the net. Though more Unix oriented than NT, it discusses plenty of issues that are NOS-independent and apply to everybody. Even if you only care about NT, most hacks will come from Unix/Linux systems. Knowing what tools are available for these platforms is a must, and this book tells you. The only problem is that there are dozens of hacks discovered since the book was written so it's not entirely up to date. Maybe "Anonymous" will get back to the word processor and write a sequel. And can someone tell us what the "secret message about the internet" is already? I'm sooo curious.


<< 1 .. 5 6 7 8 9 10 11 >>

© 2004, ReviewFocus or its affiliates