AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)

Please fill out form in order to compare prices
Title: Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)
by Stuart McClure, Joel Scambray, George Kurtz
ISBN: 0-07-222742-7
Publisher: McGraw-Hill Osborne Media
Pub. Date: 25 February, 2003
Format: Paperback
Volumes: 1
List Price(USD): $49.99
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.15 (71 reviews)

Customer Reviews

Rating: 5
Summary: This is the book to use for penetration testing and analysis
Comment: Hardly a week goes by that CNN does not report a high-profile Web site being defiled or an e-commerce site being penetrated. While most people know why these incidents occurred, Hacking Exposed explains how they occurred and, more important, how to prevent them from occurring.

The cover of Hacking Exposed announces that "Network security is Y2K without the deadline." That alarmist statement, however, is the only hype in the book. The work is packed with real-world examples and links to tools needed to assess the security of any type of client/server and Web system. As they detail the myriad vulnerabilities in different types of systems, the authors provide countermeasures for each of them.

Well organized, the book progresses in an orderly fashion. It methodically goes through the process of exploiting a target to penetrate a system--from identification and enumeration to actual penetration. The authors provide detailed instructions and explanations for many security features and flaws in Unix, Linux, Windows, NetWare, routers, firewalls, and more. Topics covered include state-of-the-art computer and network penetration, as viewed by both the attacker and the defender; remote system identification; vulnerability identification; war dialers; firewall circumvention; and denial-of-service attacks. An appendix explores the security characteristics of Windows 2000.

Some may argue that books such as this one only serve to motivate and educate hackers. The truth is that hackers are already aware of the book's contents. This book is designed for system administrators and managers who need to know their systems' risks and vulnerabilities and how to address them. When they are done with this book, system administrators and managers will be familiar with such critical topics as back channels, port redirection, banner grabbing, and buffer overflows. Hacking Exposed is a must-read for anyone who wants to know what is really happening on their network....

Rating: 4
Summary: Still the best for vulnerability assessment and pen testing
Comment: I am a senior engineer for managed network security operations, which includes conducting vulnerability assessments against client networks. I read this second edition to gain insights into ways to better assess a client's security posture, and also to understand some of the attacks I see while monitoring intrusion detection systems. Of the books I've read, Hacking Exposed remains the best guide to systematically assess and (if necessary) compromise hosts. By understanding black hat methods, defenders can better prepare for the tidal wave of exploits washing upon the networking shore.

Parts I (Casing the Establishment), II (System Hacking), and III (Network Hacking) are a tour-de-force of attacker tools and techniques. While explaining how to penetrate systems, the authors spend a fair amount of time explaining how those systems work. From a system administration standpoint, these descriptions are pure gold. Since the authors are fairly operating system-agnostic, they show the pros and cons of Microsoft, UNIX, and Novell products in the harsh light of improved security. For example, the discussion of file handles, file descriptors, and signals in chapter 8 ("Hacking UNIX") helped me understand a little bit of UNIX's guts, while giving a security spin to file system operations.

Thankfully, Hacking Exposed gives Microsoft operating systems plenty of attention. While recognizing that many of us dislike administering these systems, the authors provide helpful and solid chapters on Windows NT and Windows 2000. They also demonstrate many ways to use Windows as an attack platform. They convincingly show that if a scan can be performed in Linux, someone has developed a similar tool for Windows.

My favorite issues in the book involved describing Windows rootkits (a recent development) and UNIX loadable kernel modules. On the negative side, I felt the book lost steam in section IV (Software Hacking), spending too much time repeating earlier material. Also, unless you're a relative newbie to security, you may become bored with the litany of historic deficiencies and required patches discussed in section IV.

Overall, the second edition of Hacking Exposed remains a must-read book for security professionals. I recommend it as the sort of book one reads after gaining an overall sense of the security field and learning about TCP/IP. With those foundations in place, it's time to learn how black hats operate. If you're a system administrator, you'll learn how to fortify your network assets. If you're an intrusion detector, you'll learn what to watch for. If you're a pen-tester, you'll learn how to compromise hosts. Who could ask for more?

Rating: 1
Summary: Save Your Money
Comment: I have plenty of experience with computers and have been hacking since the term Hacker wasn't a dirty word. Anyway, a friend of mine that is very interested in Hacking purchased this book and a few other titles from these authors. He showed me the books and asked me to give him my opinion of them. As I was looking thru these books I started to laugh and told my friend to get his money back. I was shocked to see that all the info in these books can be obtained just by doing a search on SecurityFocus and Google and most of the info in this and the other books where outdated exploits that have been patched already. The IT industry moves at the speed of light and the most important aspect when it comes to securing your networks is having the newest attack and exploit information, which no book can ever provide... including this lousy book that is nothing but a compilation of what can be found for free online. Don't waste your money! I wish I could give this book zero stars.

Similar Books:

Title: Windows 2000 (Hacking Exposed)
by Joel Scambray, Stuart McClure
ISBN: 0072192623
Publisher: McGraw-Hill Osborne Media
Pub. Date: 29 August, 2001
List Price(USD): $49.99
Title: Anti-Hacker Tool Kit
by Keith J. Jones, Mike Shema, Bradley C. Johnson
ISBN: 0072222824
Publisher: McGraw-Hill Osborne Media
Pub. Date: 25 June, 2002
List Price(USD): $59.99
Title: Web Applications (Hacking Exposed)
by Joel Scambray, Mike Shema
ISBN: 007222438X
Publisher: McGraw-Hill Osborne Media
Pub. Date: 19 June, 2002
List Price(USD): $49.99
Title: Linux, Second Edition (Hacking Exposed)
by Brian Hatch, James Lee
ISBN: 0072225645
Publisher: McGraw-Hill Osborne Media
Pub. Date: 04 December, 2002
List Price(USD): $49.99
Title: Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
by Ed Skoudis
ISBN: 0130332739
Publisher: Prentice Hall PTR
Pub. Date: 23 July, 2001
List Price(USD): $49.99

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache