Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking Exposed: Network Security Secrets and Solutions

Hacking Exposed: Network Security Secrets and Solutions

List Price: $39.99
Your Price:
Product Info Reviews

<< 1 .. 3 4 5 6 7 >>

Rating: 5 stars
Summary: A good book
Review: The authors did their homework on this one. Anyone who spends time at the Cons will recognize many of the names that helped with the information put forth in this book. For those of you who know Hobbit, Mudge, Simple Nomad,AlephOne and many others know the incredible level of expertise they offer. These are the guys that make the things that break the things we make.

This book was a good read. I bought it last week and I'm going through it a second time this week. If you are serious about learning security this book is a must have. It was well done and has good solid information. After reading it you realize just how screwed your network can be - and how easy it is with the readily available tools on the net. Good job guys, it's another keeper.

Rating: 5 stars
Summary: Very interesting
Review: Eventhough i'm not very experience with hacking or network security i am very interested. I found "Hacking Exposed" very fun to read as well as educational. I would reccomend this book to anyone interested in the subjet.

Rating: 4 stars
Summary: Not bad, gentlemen
Review: Hacking Exposed is in competition with several of my titles so naturally, I had to buy it. I found it up-to-date, readable, and very informative. McClure and Scambray did a fine job. Congratulations, gentlemen.

Rating: 5 stars
Summary: it;s moble security at its finest
Review: This one will open even the pro's eye. How often do you get to have the brain of a hacker? The knowledge inside here will catch you up. But hey, nothing lasts forever.

Rating: 5 stars
Summary: Current and up to date security.
Review: This book is much better than all the other "security" books currently out. It provides information on up to date tools such as nmap, firewalk, nessus, etc. and leave out obsolete stuff like satan. It shows how information about network topology, operating systems, etc. is leaked out. It also shows known attacks against various platforms. Information security is always changing but at least this book provides a current view not rehashed material. My only dislike is the cover and title. I almost didn't buy it when I first saw it. "Hacking Exposed" kinda sensationalist.

Rating: 5 stars
Summary: A clear outline of modern network intrusion techniques.
Review: This book outlines the techniques used by systems and network crackers used today and shows you how to detect and prevent them. A must have, it takes you behind the mystery and unmasks all questions as to how hackers operate and what they know about you and your network.

Rating: 5 stars
Summary: Finally a book that gives admins a clue on whats going on!
Review: This book is gonna go a long way in the security community

Rating: 5 stars
Summary: good reading, surprisngly accurate!
Review: This book is a pleasant surprise from most of its genre. It sticks to the facts and leave little to conjecture. It certainly has made me more aware of what a real, sobering issue Internet security is. I do recommend purchasing a copy as it will truley enlighten you.

Rating: 5 stars
Summary: Best overview of network security I have ever read
Review: Lots of information... A must read

-Type

Rating: 5 stars
Summary: A practical guide for the administrator to combat hackers
Review: This was a great practical book. Clear steps were laid out for the administrator to learn how the hacker operates.

The tools used and references for further research were great. I download and used the same tools as the book has at the same time as I was reading the book.

This book ties together all those other security books I have and I can see the big picture of how a hacker would target a network an compromise different types of systems on a network.

A must have for my reference shelf.


<< 1 .. 3 4 5 6 7 >>

© 2004, ReviewFocus or its affiliates