AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Security Warrior

Please fill out form in order to compare prices
Title: Security Warrior
by Cyrus Peikari, Anton Chuvakin
ISBN: 0-596-00545-8
Publisher: O'Reilly & Associates
Pub. Date: 01 February, 2004
Format: Paperback
Volumes: 1
List Price(USD): $44.95
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 5 (4 reviews)

Customer Reviews

Rating: 5
Summary: A lot of ground
Comment: I've grown tired of books that simply inventory hacking tools. These authors delve deep and explain how things work. Awesome!!

This is an amazing book, covering an incredible amount of ground. I had a little trouble following some of the details on IDA Pro, but the authors were very responsive and helpful. This is the kind of book You'll want to read and re-read. I've got the chapters on software Reversing dog-eared already. The book is very well organized and well worth the investment.

Rating: 5
Summary: Phenomenal Book about the "Dark Side of Security"
Comment: A programmer friend of mine recently opined to me that security books tend not only to inform the "good guys" (sys admins and network security folk) about how attacks and hacker invasions occur, but also the "bad guys." I suspect most of the so-called "bad guys" already know the information presented in books like these. And if the "bad guys" already know most of the tricks, what better way to fight them than to use those "tricks" against them?

This is the book's main purpose, to show the reader computer security from the perspective of the person trying to attack and invade your computer or network. This is clearly not a book for beginners, as the book's introduction states this. It is for system admins and others interested in learning all they can about computer security. It truly provides a wealth of information in its 500 pages about different ways those so inclined can wreak havoc on your computer system or network.

There are chapters on "reverse engineering" programs (after a brief introduction to assembly language which the book points out gives you lots of control over a computer's CPU). These are ways you can reverse engineer programs in Windows, Windows CE (interesting how before reading this book I'd never given thought to how handheld devices could also be attacked and/or infected with virii or worms), and Linux. This of course proves that even the Linux OS is not as secure as some might think.

I liked the chapter on social engineering because it proves how you can infiltrate a system by researching the company for specific names and charm your way into getting sensitive information, which leads into "online reconnaissance" and also ways to hide your tracks (or is this known as "covering your ass?) so you don't get caught?

There's a whole section of the book that describes attacks on various platforms (Unix, Windows Client & Windows Server, SQL and Wireless) and the book's last section describes methods of defense against them.

This is a book with an amazing amount of information that at first glance may scare the living daylights out of some sys admins when they learn of the relative ease with which a system can be compromised. Then again, most security experts know of the risks and dangers involved with computer security. And I've always felt that to defend yourself against an attack, you should "know the enemy." This book offers lots of ways and "tricks" to do just that.

Rating: 5
Summary: Don't be fooled by the skinny Sumo wrestlers...
Comment: ..."Security Warrior" is a heavyweight contender. Peikari and Chuvakin offer a dark counterpart to O'Reilly classics like "Practical UNIX and Internet Security" (PUAIS) and "Securing Windows NT/2000 Servers for the Internet." If you've been waiting for the next good security book from O'Reilly, "Security Warrior" (SW) is it.

Part I, "Software Cracking," was my favorite section. This material is largely not for beginners, which marked a welcome change from many competing books. Part I gave an introduction to assembly language, followed by reverse engineering exercises on Windows, Linux, and Windows CE. I admit a good portion of the section was beyond my skill level, but I was able to "patch" binaries to alter program flow and even use a buffer overflow to execute previously unreachable code in a sample program. These sorts of "hands-on" exercises were informative and enjoyable.

In the second part, "Network Stalking," I was pleased to see page 181 correctly state the role played by TCP sequence numbers. (Many authors are confused by this concept, oddly.) An entire chapter on social engineering advice was certainly novel. For the rest of the book, my favorite chapter (number 10) discussed techniques to frustrate forensic analysis. A fairly brief chapter on SQL injection made good points as did an examination of mathematics' role in intrusion detection in chapter 19.

My only real criticism of SW centers on inclusion of generic security information. I didn't mark the book down for chapters on securing UNIX, for example, as the material is sound. However, if you've got PUAIS you can skip chapters 11 and 12.

SW has something for everyone in the security community. It's a broad survey of current security issues, ranging from detailed analysis of assembly language to case studies on incident response. The authors have packed a lot of value into their 500+ page work.

Similar Books:

Title: Exploiting Software : How to Break Code
by Greg Hoglund, Gary McGraw
ISBN: 0201786958
Publisher: Pearson Higher Education
Pub. Date: 17 February, 2004
List Price(USD): $49.99
Title: Wireless Hacks
by Rob Flickenger
ISBN: 0596005598
Publisher: O'Reilly & Associates
Pub. Date: 15 September, 2003
List Price(USD): $24.95
Title: Secure Coding: Principles and Practices
by Mark G. Graff, Kenneth R. Van Wyk
ISBN: 0596002424
Publisher: O'Reilly & Associates
Pub. Date: July, 2003
List Price(USD): $29.95
Title: Beyond Fear: Thinking Sensibly About Security in an Uncertain World
by Bruce Schneier
ISBN: 0387026207
Publisher: Copernicus Books
Pub. Date: September, 2003
List Price(USD): $25.00
Title: Linux Security Cookbook
by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
ISBN: 0596003919
Publisher: O'Reilly & Associates
Pub. Date: June, 2003
List Price(USD): $39.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache