Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Halting the Hacker: A Practical Guide to Computer Security (Bk/CD-ROM)

Halting the Hacker: A Practical Guide to Computer Security (Bk/CD-ROM)

List Price: $44.95
Your Price: $44.95
Product Info Reviews

<< 1 >>

Rating: 2 stars
Summary: Unpractical, outdated, and useless
Review: Being a hacker, i picked up this book to learn new ways of entering a system. What I found was 200 pages of garbage. The methods described in this book are old, unused, and juvenile. No real hacker uses these methods anymore.

Rating: 4 stars
Summary: Halting the Hacker is titled a practical guide. It positive
Review: Donald Pipkin is a security consultant at Hewlett-Packard. The book is his ledger of how to set up, secure and take complete control of a Unix based network. The guide is a thorough reference of how to stop internal and external hackers before they reak havoc on your network. The book shows in detail numerous approaches and techniques that hackers use to gain system access, privileges and control of a system. The key benefit of reading Halting the Hacker is that it clearly and quickly shows what you can do about security problems and how to stop them.

The book opens with the concept that the Unix system administrator must look at thier systems the exact way a hacker does, mainly by identifying vulnerabilities and buggy software. The book details numerous countermeasures that one can take to initially stop most hackers. After that reactive step, the book details how one can take proactive security measures to recognize and respond to future security concerns before they become catastrophes.

The book details how a hacker can take a minor software bug and turn it into a major security breach. A hacker can also try to cover their tracks while leaving back doors into your system to come back to later. Halting the Hacker also shows how one can protect their system against disgruntled or dishonest insiders and how to detect break-ins.

The book comes with a CD-ROM that has a complete software library of tools to detect and eliminate security problems. The CD-ROM also has a comprehensive information archive on security and hacker-related topics.

The book is written specially for a Unix environment. At under 200 pages, it is readable in a few hours and one can put to immediate use numerous solutions. This book is a must have for anyone needing a quick reference (or review) on how to secure Unix.

As this is a Unix specific reference, I would hope that Pipkin has the time to author similar excellent references for Windows NT and NetWare.

Rating: 2 stars
Summary: So-so
Review: I got this book to become more familiar with network security. It goes over some good topics and really helps you to understand the "secure your system" concept. However, this book is a basic overview for the network manager and I would suggest that you find some other book to go with if you wanna buy it..

Rating: 4 stars
Summary: Valuable for anyone needing to know about info security
Review: It is ironic that the advent of the computer promised to dramatically reduce paper usage; today's 1,000-page-plus computer-security tomes have probably single-handedly deforested whole regions of the earth. A happy exception to this trend of titanic texts is Halting the Hacker. Which is relatively concise yet highly informative.

It provides a good overview of core information security issues and concepts. It takes a big-picture approach to information systems security, not bogging down the reader in arcane minutiae.

Halting the Hacker delves into more intricate details and includes a CD-ROM with many security tools.

Overall, it is valuable for anyone needing to know about information systems security without sacrificing a forest in the process.

Rating: 2 stars
Summary: In responce to the "elite hacker"
Review: Noticing the so called "hackers" word of disgust towards this book, I am left asking myself time and time again, was this book geared towards teaching the average joe to hack? Judging by it's content and brief description I thought not, instead it offers a somewhat quick, realistic view of how companies all across the net are being attacked, and in doing so it offers a somewhat indepth but easy to understand method of securing ones computer.

Rating: 3 stars
Summary: What audience is this book written for?
Review: This book brings to mind a semi-retired computer security specialist who thought it might be a good idea to write a computer security book. That seems to be about as much thought as the author put into this book. With childish pictures at the front of every chapter, one can only imagine who this book is geared towards. It is extremely repetitive and could have been written in about 20 pages. If you are looking for any information on network security issues look for another book!



Rating: 4 stars
Summary: Good Starting Overview
Review: This isn't a heavily technical book. Unlike many of the other security books I've reviewed, this isn't full of tcpdump traces and the like. It is, however, a really excellent overview of security that can introduce a system administrator or a general manager to the subject.

There are actually a very few pages that deal with things like disabling unused services, but that's just 14 pages from a 337 page work, and those are really more illustrative than specific. Instead, this covers the who, the how and the why of hackers, the legal climate, and includes examples of actual incidents.

Perhaps a good indication of the target audience is the Glossary, which includes definitions for "back door", "client/server", "Kerberos", "newsgroup" and "Trojan horse".

If you are looking for programmer level information, this isn't what you want. On the other hand, this is much more technical and focused than something you might read in Newsweek or your Sunday newspaper.

Recommended for business owners and managers who need to understand computer security even though others may actually implement it, or as a base introduction for technical people with no previous exposure.

Rating: 5 stars
Summary: Second Edition is First Rate!
Review: This new expanded edition of Halting the Hacker came out in 2002 and is nearly double the size of the original edition. It takes the insight of how hackers attack systems from Pipkin's first edition and delves into the details of how to protect your Unix and Linux systems.

Real-life stories about hackers and companies who were hacked are sprinkled throughout the book making it an easy read for anyone, not just techies. The tools discussed (and which come with it on the included CD-ROM) makes it a valuable resource for everyone who deals with Unix/Linux systems.

Highly recommended!

Rating: 5 stars
Summary: Second Edition is First Rate!
Review: This new expanded edition of Halting the Hacker came out in 2002 and is nearly double the size of the original edition. It takes the insight of how hackers attack systems from Pipkin's first edition and delves into the details of how to protect your Unix and Linux systems.

Real-life stories about hackers and companies who were hacked are sprinkled throughout the book making it an easy read for anyone, not just techies. The tools discussed (and which come with it on the included CD-ROM) makes it a valuable resource for everyone who deals with Unix/Linux systems.

Highly recommended!

Rating: 4 stars
Summary: Hooray for "Halting"
Review: This review is a collaborative writing project completed by the students in a "Technology and Ethics" class at DeVry University in beautiful Colorado Springs, Colorado. It is based on a quick look at the book under consideration.

This book has several virtues. It provides a simple step-by-step process to keep hackers out. It also provides supportive links where you can download software to protect your hardware as well as business information. The simple wording allows you to concentrate on your work while helping you protect what you are working on.

Although this book is outdated, it would still be helpful in setting up a security policy. The illustrations in this book would not be suitable for some business environments; however they would be useful for the individual computer user.

I would recommend this book to beginners in the computer technology field. This book comes with a useful CD-ROM that contains software and added resources.


<< 1 >>

© 2004, ReviewFocus or its affiliates