Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

List Price: $29.99
Your Price:
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: A true genius
Review: Mike Schiffman has always amazed me with his intelligence and cunning. His experience in this field shines through as he delivers real world examples in a entertaining and informative format. Highly recommended.

Rating: 5 stars
Summary: Real-World Security IQ Test
Review: Mike Schiffman's book, "Hackers Challenge," is a very innovative approach towards computer security learning and skill assessment. Guiding the reader from evidence, to reasons, to how and why, and to the end results of a hack attempt, this book provides a blueprint for pursuing and examining the forensic evidence of an attack. This book cohesively brings together all aspects of a hacking event into 20 separate incidents that will guide the reader towards the ultimate answers but only if you have the ability to see the forest from the trees. If you have the skills to recognize the attacks this book will provide confirmation of your abilities along with items of interest you may have missed. If you are left wondering what all the evidence adds up to, this book will get you as close to the on-site experience as possible that most dry manual or reference books do not provide.

For any system administrator this book provides an invaluable way to test your talents and expertise against real-world hacking events in a safe environment using multiple hardware and software products. This book is a must-have for anyone serious about the security of their systems and their ability to recognize and thwart hackers before, during and after an attack. I highly recommend this book for the beginner looking to build their abilities to a veteran looking to confirm or update their skills.

Rating: 5 stars
Summary: Schiffman = love
Review: Schiffman is the coolest. His tattoos rock, and his judo is like Menudo. I'm gonna use my company's training budget to buy his books just cuz he's cool.

Rating: 5 stars
Summary: Schiffman = love
Review: Schiffman is the coolest. His tattoos rock, and his judo is like Menudo. I'm gonna use my company's training budget to buy his books just cuz he's cool.

Rating: 5 stars
Summary: The real thing...
Review: So, you'd like to know more about real security incidents and computer forensics... then this could be your book!
Note however, that for the book being profitable, you should already have a good understanding of the matter.
The presentation is a bit melodramatic trying to sell a 'mystery' image. Twenty cases of security incidents are presented under suggestive names (e.g., 'A Thousand Razors', 'Omerta', and so on..) and of course, twenty separated 'solutions' are proposed as well. Unfortunately, the presentations are quite heterogeneous, ranking from very clever ones to real 'puzzles'.
As for the issues covered, the range is quite broad, including among others:
- Directory traversal attacks
- VPNs attacks
- Wireless attacks
- Buffer overflows
- E-mail sniffing
- Macintosh hacking
- DoS attacks
- Trojan codes
- Forensic analysis

Three or four cases can be easily solved, but some of the challenges are almost impossible to solve due to the weakness of the supplied clues.
At the bottom line, the book is well worth to be purchased. It is original (almost unique) and very useful in expert hands. Once the cases are solved, all the information makes sense, giving you twenty illustrative case studies.

Rating: 5 stars
Summary: Very nice
Review: The author details exploits for IIS, SQL Server, Solaris and even Macintosh. The book definately makes you think, and will probably remind you of a couple holes you might need to patch. The author even provides URL's to online resources that you can use to protect from these attacks, or learn more. Hard to put the book down! Recommended reading!

Rating: 3 stars
Summary: Great Book
Review: The best chapter definately was the fifth chapter. So much information. elite!

Rating: 3 stars
Summary: Good book but light on info
Review: The premise of the book really intrigued me so I picked it up. While the writing is good and there is some really good information, I don't think the information content was quite worth the money. Not to spoil the mystery for you, but several of the hacks described really just boiled down to a particular type of attack (to compromise) followed by something else. Similarly, the logs provided (for publishing purposes) have to be truncated. In essence, the reader is spoon-fed because only relevant logs are shown; quite different than real life where an admin may be facing 20 Mb of logs that they have to sift through.

One last point. The author of one of the sections was Tim Mullen. Had I known that beforehand, I would not have purchased the book. I've read his articles on securityfocus.com and have little respect for his abilities in the security field. Luckily, he only authored one scenario.

Rating: 3 stars
Summary: Good book but light on info
Review: The premise of the book really intrigued me so I picked it up. While the writing is good and there is some really good information, I don't think the information content was quite worth the money. Not to spoil the mystery for you, but several of the hacks described really just boiled down to a particular type of attack (to compromise) followed by something else. Similarly, the logs provided (for publishing purposes) have to be truncated. In essence, the reader is spoon-fed because only relevant logs are shown; quite different than real life where an admin may be facing 20 Mb of logs that they have to sift through.

One last point. The author of one of the sections was Tim Mullen. Had I known that beforehand, I would not have purchased the book. I've read his articles on securityfocus.com and have little respect for his abilities in the security field. Luckily, he only authored one scenario.

Rating: 5 stars
Summary: Wow, alot better than I thought!
Review: This book seemed like it might be kinda campy, but when I actually got inside, it was great! I learned alot about how the other side works... Also Mike's obscure references were hilarious!


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates