Rating:  Summary: Was skeptical but found it very useful in the end Review: I read the couple of bad reviews before buying the book and compared them to the more than 20 great reviews. I may have been reading a different book than those reviewers who did not like the book.I found it extremely useful and the right level of detail for both sysadmins who have had years of experience and for security specialists in the consulting arena. The reviewer who obviously thinks himself a hacker is just a wanna-be security specialist. It was obvious that the authors had years of security experience and could talk to both the sysadmins and security specialists. Real security specialists can appreciate how detailed the book is and how much of a reference guide it can be. This was a great book that I recommend to all my co-workers. Jason
Rating:  Summary: Been There, Done That. Review: I didn't find anything in this book that I hadn't found after doing a few days worth of research on the web. Many parts of the text seem to have been directly lifted from the Read Me files of the tools that the author is trying to describe. A real cut-n-paste job.
Rating:  Summary: Fair --- what is and isn't explained is odd Review: The book is interesting, but could have used some better editorial review. The authors spend an enormous amount of time explaining what ping is, for example, but define it in terms of TCP primitives that are far more complex, and which go unexplained!
Rating:  Summary: Great awareness Review: This book seems to be very current and inline with many of the sound security practices security professionals are involved with. The interesting part is that this book reads very much like a hackers manual, with a recipe to hack and then a recipe to avoid being hacked. Therefore, this book is very to-the-point and effective. Although some readers have written otherwise, I think this book is very well organized; I really don't care about NetWare hacking when I'm protecting an NT network or vice-versa. This book is arranged mainly by operating systems. Since many organizations have firewalls that prevent many of these hacks written about in this book, the protection seems to be effective more from the point of the intranet. I won't say there's anything scary from the information; the information is great to add to a corporate security policy.
Rating:  Summary: A GrEaT JoB Review: I had managed NT, Unix and OpenVMS systems for a long time. Under academic point of view they have bugs and bugs that should be fixed, not avoided by installing Firewalls, SolidWalls or PerfectWalls. Could the problem could be due to NT or UNIX or TCP/IP implementation? The book shows the testing tools, 'band-aid' and the answer between lines. To fix you must to know where, when and how the system is broken. The authors do not show all this questions (offcourse), but they showed enough. A great book. Congratulations to Authors.
Rating:  Summary: Just when you thought you knew a subject! Review: Just when you think you know a topic , you read a book like this . I thought I knew NT and UNIX , how wrong I was! This book really opened my eyes to the loopholes and possibilities for security breaches in systems I thought I had secured...
Rating:  Summary: Reads like a Microsoft ad Review: There is some really good content here. I especially liked the information on reconnaissance and enumeration. The authors are obviously *very* biased towards Microsoft products however and spend a lot of time trying to convince the reader that they make the most secure operating systems on the planet. While some Windows exploits are covered, their impact receives a good dose of marketing spin.
Rating:  Summary: Excellent book that brought about the security awareness Review: This book does an excellent job in making everyone aware of what the kiddie scripters is capable of doing merely by reading and following materials readily available off the web. The content covers a very broad range of topics, from the common info-gathering techniques to the published OS/app cracks. It's one of the best "Cracking" book out there.
Rating:  Summary: the book is good but its not good enough Review: the book-as i said befor in the summary- is good but its not good enough.....its not written for a certain class of readers......its not high enough for the experts and its ont simple enough for the beginners
Rating:  Summary: Outstanding! A must have for any SERIOUS Security Admin Review: I build encrypted data networks for the US Govt. This book contains MUCH more information than I expected. It fluently covers the methods used before and during a network attack. Hacking Exposed impressed me so much that I have put it into my personal collection and recommended it to more than a dozen colleagues. Excellent work gentlemen! I look forward to more from McClure, Scambray, and Kurtz.
|