Rating:  Summary: End Hacking with this book Review: The nice thing about this book is the way that it makes you think more and more about security issues , also the The actual hacking techniques is a nice thing to try on your servers and helps you to achieve a better hacking proof network and servers.
Rating:  Summary: Good Book To Read Review: I like this book. It is easy,helpful and rich
Rating:  Summary: Good read - good info on hacker defense Review: The book is a good read and has many interesting examples of hacker attacks and tools. I'm an MCSE and a webserver administrator so I felt compelled to try all these hacking techniques on my servers and colleagues servers. The actual hacking techniques are over simplified and generally do not offer a casual hacker (non leet hacker) any opportunity to compromise you system. Only a way to impress their friends by saying - look I can tell what ports are open on this machine or look I can tell what operating system they are running etc. The explainations of defenses from these hacker probes and attacks I thought were very useful. The defenses are clear and relatively easy to implement. If you are paranoid - or take substantial pride in keeping hackers out of your system - definitley read this book. If you are generally interested in network WAN security, read this book.
Rating:  Summary: Hacking Reviewed Review: Boring! What else is there to say about hacking, it isn't like the movies, and this book taught me that.... but i didn't learn that much
Rating:  Summary: These guys are good! Review: I loved this book...I am an IT Technician and reading and being able to use this book on a daily basis really opened some eyes of my co-workers. Would rate this a great read for anyone interested in the skill of Intusion Detection and a must read for anyone running or managing an NT environment.
Rating:  Summary: This was just what I was looking for! Review: I am new to networking and wanted to learn more about security and hacking. I have been especially interested in exploring the hacking world and learning a few neat tricks. This book has made me aware of the methods a hacker uses, and has allowed me to experiment with these methods as well. I found the book to be very valuable for beginner and beyond, but i am now looking for a book that goes even more in depth...if possible.if you want to learn more about hacking and security... buy it! If you already are a pro... you will still benifit by it, but may want to seek something more.
Rating:  Summary: Easy to Read and Very Informative Review: I manage a crew of about 20 people who do intrusion detection analysis. The stellar achivement of the authors of Hacking Exposed is packing their book with useful information AND making it easy to read. The only thing wrong with this book is that in attempting to cover everything, the authors talk about some things that aren't really worth knowing and skimp on topics where most readers would want more depth. There are many topics that received excellent coverage in this book. Among them are: DNS records and zone transfers, the ins and outs of nmap, Unix log files, the NT null session or Red Button vulnerability, the SAM database and NT password guessing. This book does an excellent job covering Netbios and NT vulnerabilities which I found exteremly useful since most of my background involves Unix. Topics that could have been left out of this book or that received undue attention include Windows 95/98 and Novell. In the last section of the book the Authors seemed to want to cover as many tools and vulnerabilities as possible. I would have preferred a more informative treatment of a smaller number of issues. An important topic I thought the authors didn't do justice was buffer overflow vulnerabilities. The reader is referred to papers done by Dr. Mudge and AlephOne. All in all I found this book very useful and look forward to the second edition.
Rating:  Summary: Every Sysadmin should read this book Review: Best book Ive read on system security... If you dont have it already, buy it now.
Rating:  Summary: WHAT A BOOK! Review: Great book, teaches you how to hack many systems step-by-step, and then teaches you how to secure your system, I recommend this book for EVERY bigenner in the hacking-Adminstrators world. But we need a detailed one, a very detailed.
Rating:  Summary: Bloated...with little substance Review: This book is really nothing more than a guide. If you don't have time to search the internet (and the stuff is not hard to find) then this book may be of some help. It's amazing how they managed to fill up so many pages and tell you very little. They tell you about all of the tools and where to get them, but they give you nothing on how to use them, with the exception of nmap and ncat. If you can get this book used for a few bucks, then it may be a good buy as a reference, but don't buy it at the retail price.
|