Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking Exposed: Network Security Secrets and Solutions

Hacking Exposed: Network Security Secrets and Solutions

List Price: $39.99
Your Price:
Product Info Reviews

<< 1 2 3 4 5 .. 7 >>

Rating: 4 stars
Summary: End Hacking with this book
Review: The nice thing about this book is the way that it makes you think more and more about security issues , also the The actual hacking techniques is a nice thing to try on your servers and helps you to achieve a better hacking proof network and servers.

Rating: 4 stars
Summary: Good Book To Read
Review: I like this book. It is easy,helpful and rich

Rating: 4 stars
Summary: Good read - good info on hacker defense
Review: The book is a good read and has many interesting examples of hacker attacks and tools. I'm an MCSE and a webserver administrator so I felt compelled to try all these hacking techniques on my servers and colleagues servers. The actual hacking techniques are over simplified and generally do not offer a casual hacker (non leet hacker) any opportunity to compromise you system. Only a way to impress their friends by saying - look I can tell what ports are open on this machine or look I can tell what operating system they are running etc. The explainations of defenses from these hacker probes and attacks I thought were very useful. The defenses are clear and relatively easy to implement. If you are paranoid - or take substantial pride in keeping hackers out of your system - definitley read this book. If you are generally interested in network WAN security, read this book.

Rating: 2 stars
Summary: Hacking Reviewed
Review: Boring! What else is there to say about hacking, it isn't like the movies, and this book taught me that.... but i didn't learn that much

Rating: 5 stars
Summary: These guys are good!
Review: I loved this book...I am an IT Technician and reading and being able to use this book on a daily basis really opened some eyes of my co-workers. Would rate this a great read for anyone interested in the skill of Intusion Detection and a must read for anyone running or managing an NT environment.

Rating: 5 stars
Summary: This was just what I was looking for!
Review: I am new to networking and wanted to learn more about security and hacking. I have been especially interested in exploring the hacking world and learning a few neat tricks. This book has made me aware of the methods a hacker uses, and has allowed me to experiment with these methods as well. I found the book to be very valuable for beginner and beyond, but i am now looking for a book that goes even more in depth...if possible.

if you want to learn more about hacking and security... buy it! If you already are a pro... you will still benifit by it, but may want to seek something more.

Rating: 4 stars
Summary: Easy to Read and Very Informative
Review: I manage a crew of about 20 people who do intrusion detection analysis. The stellar achivement of the authors of Hacking Exposed is packing their book with useful information AND making it easy to read. The only thing wrong with this book is that in attempting to cover everything, the authors talk about some things that aren't really worth knowing and skimp on topics where most readers would want more depth.

There are many topics that received excellent coverage in this book. Among them are: DNS records and zone transfers, the ins and outs of nmap, Unix log files, the NT null session or Red Button vulnerability, the SAM database and NT password guessing. This book does an excellent job covering Netbios and NT vulnerabilities which I found exteremly useful since most of my background involves Unix.

Topics that could have been left out of this book or that received undue attention include Windows 95/98 and Novell. In the last section of the book the Authors seemed to want to cover as many tools and vulnerabilities as possible. I would have preferred a more informative treatment of a smaller number of issues.

An important topic I thought the authors didn't do justice was buffer overflow vulnerabilities. The reader is referred to papers done by Dr. Mudge and AlephOne.

All in all I found this book very useful and look forward to the second edition.

Rating: 5 stars
Summary: Every Sysadmin should read this book
Review: Best book Ive read on system security... If you dont have it already, buy it now.

Rating: 4 stars
Summary: WHAT A BOOK!
Review: Great book, teaches you how to hack many systems step-by-step, and then teaches you how to secure your system, I recommend this book for EVERY bigenner in the hacking-Adminstrators world. But we need a detailed one, a very detailed.

Rating: 2 stars
Summary: Bloated...with little substance
Review: This book is really nothing more than a guide. If you don't have time to search the internet (and the stuff is not hard to find) then this book may be of some help. It's amazing how they managed to fill up so many pages and tell you very little. They tell you about all of the tools and where to get them, but they give you nothing on how to use them, with the exception of nmap and ncat. If you can get this book used for a few bucks, then it may be a good buy as a reference, but don't buy it at the retail price.


<< 1 2 3 4 5 .. 7 >>

© 2004, ReviewFocus or its affiliates