Rating:  Summary: Not for civilians Review: I purchased this book to educate myself on threats to networks. Although I have a strong computing background (degree in computational chemistry, 20+ years application programming), my network weakness made this book virtually incomprehensible. It is laid out much like a dictionary where an attack is listed along with its popularity, simplicity, impact and risk rating. What usually follows is a very technical discussion of the attack and possible counter measures. I suspect that this book would be a great use to network and system administrators, but I also suspect few others will get much out of it.
Rating:  Summary: Good reference book Review: You are currently looking for a reference book on how people can access your computer? You are currently managing a project which requires real-life example of computer break-in? You just are looking for all possible security break-in in one book. If you answered yes to any of those, read this book. You will find some (or maybe many) suprises on how it is both easy to break-in and to secure your computer. The best thing for this book is the fact that all trouble has a solution and all of it is written there.
Rating:  Summary: If you're new to the field, start with this book. Review: I am responsible for a 50+ person intrusion detection mission, and I've recommend this volume to each new analyst since I read it in Oct 99. The is one of the few mainstream publications which methodically and clearly steps through the process of exploiting an Internet target. I am surprised earlier reviewers wanted more how-to information -- just how detailed does it have to be? For example, if some folks I watched last fall trying RDS/MDAC exploits had followed the author's examples, they would have done more than deface web sites. While books detailing exploits risk instant obsolescence -- notice "Maximum Security" will release edition 3 soon -- this work maintains the proper balance between tech and theory. For new security personnel, "Hacking Exposed" provides a logical and easy-to-follow reference; older hands will enjoy pointing to the book when new folks ask questions! Thanks Stuart, Joel, and George!
Rating:  Summary: Bible Review: This book is a must for any one interested in security or not being a victim. It is easy to follow and provides a great amount of detail without boring you. I consider this the best book on the subject to date.
Rating:  Summary: i g07 7his b00k n0w i'm 7h3 m4s70r h4X0r Review: this book is totally amazing! i used to know how to code in QBasic, but now i am a master hacker! thank you very much mr smartay hacker man for writing this book for me. if it weren't for you i wouldn't be as good of a hacker that i am today. i salute you.
Rating:  Summary: A great collection of security problems Review: I bought this one at once when I discovered it without hesitation. This book compiles a good collection of security problems we are now facing. Although most of them are not new and unknown security problems, I believe this book raise the awareness of them as it clearly rates the popularity, simplicity and impact of each problem. Being a CISSP, I recommend this book is a must read for all network administrators and security consultants!
Rating:  Summary: Exposing Hacking Exposed Review: When consider a title, the audienced and projected population should be considered. This book fails both. I read a lot of computer books, since I work on networks and I wouldn't want to do anything else for a living. I hope the authors have something other to do than writing, since they do it so very poorly. The book is badly titled and terribly written. After an hour's struggle I set it aside. It rambles and presents topics such that retention is all but impossible. Simply put, Hacking Exposed has nothing to do with hacking, cracking and everything to do with the boring diatribes of those big on theorectical security and lean on practice. Deep discounts are definately in order.
Rating:  Summary: Great, In-Depth book Review: Great book. Covered all aspects of how to hack, to protecting yourself from that specific exploit. Every administrator should read this.
Rating:  Summary: Good security read, summarizing well known exploits. Review: Hacking Exposed offers a good overview of many well-known, and some lesser known, secuirty vulnerabilities. A fairly quick read, strikes a good balance between superficiality and going too deeply into code. Very good on NT and router security (often overlooked), but could be better on UNIX (not much Linux-specific advice here). As a part-time admin for a small network, I'm glad I picked this book up. Would have like to see more on security tips for small business security -- ex. review/advice re: SonicWall /Watchguard type boxes.
Rating:  Summary: Very helpful and useful Review: Most people think that if you buy it and read it a few times you are gonna be a hacker: WRONG! This book is meant to help sysadmins and stuff like that and it serves its purpose well. I recommend this book to anyone interested in computers!
|