AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle by Erik Pace Birkholz, Stuart McClure ISBN: 1-931836-69-8 Publisher: Syngress Pub. Date: 17 February, 2003 Format: Paperback Volumes: 1 List Price(USD): $69.95 |
Average Customer Rating: 4.73 (11 reviews)
Rating: 5
Summary: Awesome book!
Comment: I've been working in information security since before their was information security. I've seen just about every type of hack and every type of network: good, bad, and ugly. This book contains an astounding amount of very up to date and very detailed information on UNIX, Windows, Exchange and OWA, SQL, Oracle, Web apps, Network architecture, corporate policy, etc. You name it, it's in here. What really impressed me about the book is the authors are able to cover such a breadth of topics at such an advanced level. You'll learn more about Oracle security in this one chapter (by David Litchfield, so it shouldn't be surprising) than you will reading a whole book on Oracle security.
Rating: 5
Summary: Superb, well balanced content
Comment: It isn't often I come across a book on security that gets so much right. While I think of myself as a subject matter expert on matters of security I was pleased at how much depth this book contained and how many tips I picked up. The SQL and IIS chapters are perhaps the best coveraged of their subject matter I have yet seen.
The coverage is balanced between the various colors of hats people wear and contains masses of recommendations for hardening the various components discussed.
Rating: 3
Summary: Overall good - great to see focus on internal security
Comment: There is many hacking books out there right now. Many of these are concerned with external penetration testing, which most non-security professionals are obsessed with - thanks to all the sensationalized hacking stories by the often clueless press.
"Special Ops" discusses the internal threat, which in most cases is more important to the majority of businesses. A simple and straight forward methodology is presented to deal with internal security. Analyze your business, identity your business assets, profile them, group them and prioritize them and then finally secure these assets using the 80/20 pareto principle. This is common sense but great to see that someone has written a book about it.
There are separate chapters covering various platforms (WinX, Unix etc), database & application servers (Exchange, Oracle etc) and web applications. The final chapter discusses the most important topic - security policies. Without a security policy driven by business requirements - there will be no "real" security... The chapters are written by various subject matter experts, which makes the book feel like a collection of white papers. A few chapters are very high level - the books spans a very wide range of topics. Most of the information can be easily found on the internet if you know where to go and look.
One complaint is the pages with code examples. Put code examples on a CD and include the CD with the book. I do not think people are interested in spending time typing in the code examples. This should be supplied with the book on a CD.
To summarize, overall an interesting book, due to the focus on internal testing. Wide area of topics, which makes the content a bit too high level at times. One thought that always strike me is the emphasis on the technology. Technology is only a business tool. It is more important to understand your business, manage your people and physical security before you should worry about the technology. What good is all the network and host security if you can either call your business and social engineer passwords or even worse - just walk into your secure areas uncontested and do whatever I want to do? I guess it is easier to control about deal with the logical aspects and technology than irrational people who never do what they are supposed to,
![]() |
Title: Snort 2.0 Intrusion Detection by Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth ISBN: 1931836744 Publisher: Syngress Pub. Date: February, 2003 List Price(USD): $49.95 |
![]() |
Title: Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed) by Stuart McClure, Joel Scambray, George Kurtz ISBN: 0072227427 Publisher: McGraw-Hill Osborne Media Pub. Date: 25 February, 2003 List Price(USD): $49.99 |
![]() |
Title: Hacker's Challenge 2: Test Your Network Security & Forensic Skills by Mike Schiffman, Bill Pennington, David Pollino, Adam J. O'Donnell ISBN: 0072226307 Publisher: McGraw-Hill Osborne Media Pub. Date: 18 December, 2002 List Price(USD): $39.99 |
![]() |
Title: Stealing the Network: How to Own the Box by Ryan Russell, Ido Dubrawsky, FX, Joe Grand, Tim Mullen ISBN: 1931836876 Publisher: Syngress Pub. Date: 01 April, 2003 List Price(USD): $49.95 |
![]() |
Title: Security Warrior by Cyrus Peikari, Anton Chuvakin ISBN: 0596005458 Publisher: O'Reilly & Associates Pub. Date: 01 February, 2004 List Price(USD): $44.95 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments