Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Hacking Exposed: Network Security Secrets and Solutions |
List Price: $39.99
Your Price: |
 |
|
|
Product Info |
Reviews |
Rating:  Summary: All around great book Review: Hacking exposed has a rather deceitful title however, is very honest if you read the cover. It has detail instruction and explaination for many security features and flaws in Unix, Linux, Windows NT, Windows 95/98, Windows 2000, Routers, and even individual freeware and commercial software releases. This is a great book to get your foot in the door on your basic network security. There is too much information on security available to print it all in one book, and the authors realize this and do not deny it. This book is not however and guide to hacking, and if you are interested in a book on hacking look elsewhere. Hacking is only presented with the 'disclaimer' of using it on yourself to make your system security stronger, which is a very valid point. Hacking cannot be published publicly, because the whole idea of hacking is contingent upon flaws in the way that software is set up and created. If these flaws are released to the public, namely the creators of the software, the exploitable point will most likely be fixed and rendered obsolete and useless. This book explains flaws that have exsisted and how you can fix them so they cannot be exploited to your disadvantage. -dM
Rating:  Summary: About time someone knew what they were writing about Review: I've read about 4 security books and this book was far better than the rest. Instead of simply telling you not to run a certain service cuz it might have a hole, it actually tells you what the hole is, how to exploit it, and where to get the tools you need to exploit it. This isn't a list of programs and their holes though, it starts at the begining teaching you how to enumarate (get info) from a computer from all kinds of different methods, such as trying to find out OSs, their versions, services that are running and who is currently on the system. It talks about scanning groups of computers to find the few that are exploitable. It then goes on to explain specific Windows9X holes, then NT, to Novell, and then to Unix. Spending upto 60 pages on each operating system (very in depth and all of it usefull). There are also chapters just on dialup and VPNs (virtual private networks), firewalls, network hardware (routers) and an entire chapter just about DoS's (Denial of Services). It then goes into Advance Techniques, problems with PHP and ASP, and then onto a chapter on Windows2000 (talk about being up to date). As far as my book collection goes, this definetly gets my Top5 rating of the 100+ books I've read. Theres alot of meat to eat in this book.
Rating:  Summary: Good, but hard to keep up to date! Review: The book is great for telling you what it has to tell you. Unfortunately, so many new exploits are found each day, it is hard for the book to keep up to date. I am already a couple of revisions behind. Still, it is a worthwhile read.
Rating:  Summary: Everyone who owns a computer should have this book Review: This is an excellent book on computer and network security. I thought I new a lot about the subject, but after reading this book from cover to cover I know how much work I need to do to secure my networks. The book is packed with real-world scenarios and up to date information and tools (or links to tools) needed to hack into virtually any type of system. Fortunately, the authors wisely chose to provide countermeasures for each hack listed, which is invaluable to anyone who's livelihood involves maintaining networks. The organization of the book is excellent - it takes you through the steps needed to hack a system, from identification and enumeration to actual penetration, but also allows the advanced reader to quickly find system specific information or methods. Several appendixes are loaded with links to security sites and tools, legal information, and even common port lists. A must read for anyone who owns a computer; you will realize how vulnerable you really are.
Rating:  Summary: Excellent for beginning hackers Review: If you want to go over to the 'dark side', this book describes enough hacking technique to turn you into a 'script kiddie' (or enough to defend against them). Of course, it's the things that the book *doesn't* go into detail about that makes you want to learn more in-depth detail about network security (things like buffer overruns and process hijacking). A good starting point for budding hackers, people who administer networks, or anyone who is technically-minded. It also teaches enough about Back Orifice and NetBus to have fun messing with your co-workers on those occasional boring days in the cubicle!
Rating:  Summary: Exposed your network Review: This is the first technical book about security in network/systems. I found that some books only show how to "close" a hole in a network without informing what it is closing from. This is a good book for busy administrators that does not have enough time to update himself, since this book is a compilation of security threats/tools/defences
Rating:  Summary: Good Book Review: This is a good book for anyone who wants to learn more about network security and hacking in general. The author provides likes to a substantial amount of downloadable resources from the web. Although some of the sites are no longer in existance, there are a substantial amount of the tools discussed in the book on the internet that are free for a short period.
Rating:  Summary: I simply loved this book Review: This book is a must for every Admin out there. I would also recommend this book to IT managers/directors/etc. This book is more than just an explaination of security holes/fixes but puts you into the mind of the cracker. You must see the world as the cracker does in order to defend yourself. In Patton, Patton was shouting "I read your book" to Rommel as he beat Rommel in a tank battle. This is the same for System/Netowkr Admins everywhere, it is imperitive we read the cracker's book and understand his assault from beginning to end. Only then can you be prepared. This will also wake up your managers if they are not paranoid enough :-)
Rating:  Summary: Appended review Review: I forgot to say that the references in the back are excellent and I still use many of the sites as a reference when testing my servers for intrusion.
Rating:  Summary: A great review of some older techniques Review: This book is a great review of some older intrusion techniques. Despite the fact that in the security world this book is rather old it still gives some good methods on basic intrusion techniques. It also makes a very good destinction between hacking and cracking. There are not many authors out there who recognize the difference. I know that there is a second edition out now. I have not had time to read it, but I am positive that they would be able to keep releasing new editions with all of the security flaws that are found weekly.
|
|
|
|