AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Security Warrior by Cyrus Peikari, Anton Chuvakin ISBN: 0-596-00545-8 Publisher: O'Reilly & Associates Pub. Date: 01 February, 2004 Format: Paperback Volumes: 1 List Price(USD): $44.95 |
Average Customer Rating: 5 (4 reviews)
Rating: 5
Summary: A lot of ground
Comment: I've grown tired of books that simply inventory hacking tools. These authors delve deep and explain how things work. Awesome!!
This is an amazing book, covering an incredible amount of ground. I had a little trouble following some of the details on IDA Pro, but the authors were very responsive and helpful. This is the kind of book You'll want to read and re-read. I've got the chapters on software Reversing dog-eared already. The book is very well organized and well worth the investment.
Rating: 5
Summary: Phenomenal Book about the "Dark Side of Security"
Comment: A programmer friend of mine recently opined to me that security books tend not only to inform the "good guys" (sys admins and network security folk) about how attacks and hacker invasions occur, but also the "bad guys." I suspect most of the so-called "bad guys" already know the information presented in books like these. And if the "bad guys" already know most of the tricks, what better way to fight them than to use those "tricks" against them?
This is the book's main purpose, to show the reader computer security from the perspective of the person trying to attack and invade your computer or network. This is clearly not a book for beginners, as the book's introduction states this. It is for system admins and others interested in learning all they can about computer security. It truly provides a wealth of information in its 500 pages about different ways those so inclined can wreak havoc on your computer system or network.
There are chapters on "reverse engineering" programs (after a brief introduction to assembly language which the book points out gives you lots of control over a computer's CPU). These are ways you can reverse engineer programs in Windows, Windows CE (interesting how before reading this book I'd never given thought to how handheld devices could also be attacked and/or infected with virii or worms), and Linux. This of course proves that even the Linux OS is not as secure as some might think.
I liked the chapter on social engineering because it proves how you can infiltrate a system by researching the company for specific names and charm your way into getting sensitive information, which leads into "online reconnaissance" and also ways to hide your tracks (or is this known as "covering your ass?) so you don't get caught?
There's a whole section of the book that describes attacks on various platforms (Unix, Windows Client & Windows Server, SQL and Wireless) and the book's last section describes methods of defense against them.
This is a book with an amazing amount of information that at first glance may scare the living daylights out of some sys admins when they learn of the relative ease with which a system can be compromised. Then again, most security experts know of the risks and dangers involved with computer security. And I've always felt that to defend yourself against an attack, you should "know the enemy." This book offers lots of ways and "tricks" to do just that.
Rating: 5
Summary: Don't be fooled by the skinny Sumo wrestlers...
Comment: ..."Security Warrior" is a heavyweight contender. Peikari and Chuvakin offer a dark counterpart to O'Reilly classics like "Practical UNIX and Internet Security" (PUAIS) and "Securing Windows NT/2000 Servers for the Internet." If you've been waiting for the next good security book from O'Reilly, "Security Warrior" (SW) is it.
Part I, "Software Cracking," was my favorite section. This material is largely not for beginners, which marked a welcome change from many competing books. Part I gave an introduction to assembly language, followed by reverse engineering exercises on Windows, Linux, and Windows CE. I admit a good portion of the section was beyond my skill level, but I was able to "patch" binaries to alter program flow and even use a buffer overflow to execute previously unreachable code in a sample program. These sorts of "hands-on" exercises were informative and enjoyable.
In the second part, "Network Stalking," I was pleased to see page 181 correctly state the role played by TCP sequence numbers. (Many authors are confused by this concept, oddly.) An entire chapter on social engineering advice was certainly novel. For the rest of the book, my favorite chapter (number 10) discussed techniques to frustrate forensic analysis. A fairly brief chapter on SQL injection made good points as did an examination of mathematics' role in intrusion detection in chapter 19.
My only real criticism of SW centers on inclusion of generic security information. I didn't mark the book down for chapters on securing UNIX, for example, as the material is sound. However, if you've got PUAIS you can skip chapters 11 and 12.
SW has something for everyone in the security community. It's a broad survey of current security issues, ranging from detailed analysis of assembly language to case studies on incident response. The authors have packed a lot of value into their 500+ page work.
![]() |
Title: Exploiting Software : How to Break Code by Greg Hoglund, Gary McGraw ISBN: 0201786958 Publisher: Pearson Higher Education Pub. Date: 17 February, 2004 List Price(USD): $49.99 |
![]() |
Title: Wireless Hacks by Rob Flickenger ISBN: 0596005598 Publisher: O'Reilly & Associates Pub. Date: 15 September, 2003 List Price(USD): $24.95 |
![]() |
Title: Secure Coding: Principles and Practices by Mark G. Graff, Kenneth R. Van Wyk ISBN: 0596002424 Publisher: O'Reilly & Associates Pub. Date: July, 2003 List Price(USD): $29.95 |
![]() |
Title: Beyond Fear: Thinking Sensibly About Security in an Uncertain World by Bruce Schneier ISBN: 0387026207 Publisher: Copernicus Books Pub. Date: September, 2003 List Price(USD): $25.00 |
![]() |
Title: Linux Security Cookbook by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes ISBN: 0596003919 Publisher: O'Reilly & Associates Pub. Date: June, 2003 List Price(USD): $39.95 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments