AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle

Please fill out form in order to compare prices
Title: Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
by Erik Pace Birkholz, Stuart McClure
ISBN: 1-931836-69-8
Publisher: Syngress
Pub. Date: 17 February, 2003
Format: Paperback
Volumes: 1
List Price(USD): $69.95
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.73 (11 reviews)

Customer Reviews

Rating: 5
Summary: Awesome book!
Comment: I've been working in information security since before their was information security. I've seen just about every type of hack and every type of network: good, bad, and ugly. This book contains an astounding amount of very up to date and very detailed information on UNIX, Windows, Exchange and OWA, SQL, Oracle, Web apps, Network architecture, corporate policy, etc. You name it, it's in here. What really impressed me about the book is the authors are able to cover such a breadth of topics at such an advanced level. You'll learn more about Oracle security in this one chapter (by David Litchfield, so it shouldn't be surprising) than you will reading a whole book on Oracle security.

Rating: 5
Summary: Superb, well balanced content
Comment: It isn't often I come across a book on security that gets so much right. While I think of myself as a subject matter expert on matters of security I was pleased at how much depth this book contained and how many tips I picked up. The SQL and IIS chapters are perhaps the best coveraged of their subject matter I have yet seen.

The coverage is balanced between the various colors of hats people wear and contains masses of recommendations for hardening the various components discussed.

Rating: 3
Summary: Overall good - great to see focus on internal security
Comment: There is many hacking books out there right now. Many of these are concerned with external penetration testing, which most non-security professionals are obsessed with - thanks to all the sensationalized hacking stories by the often clueless press.

"Special Ops" discusses the internal threat, which in most cases is more important to the majority of businesses. A simple and straight forward methodology is presented to deal with internal security. Analyze your business, identity your business assets, profile them, group them and prioritize them and then finally secure these assets using the 80/20 pareto principle. This is common sense but great to see that someone has written a book about it.

There are separate chapters covering various platforms (WinX, Unix etc), database & application servers (Exchange, Oracle etc) and web applications. The final chapter discusses the most important topic - security policies. Without a security policy driven by business requirements - there will be no "real" security... The chapters are written by various subject matter experts, which makes the book feel like a collection of white papers. A few chapters are very high level - the books spans a very wide range of topics. Most of the information can be easily found on the internet if you know where to go and look.

One complaint is the pages with code examples. Put code examples on a CD and include the CD with the book. I do not think people are interested in spending time typing in the code examples. This should be supplied with the book on a CD.

To summarize, overall an interesting book, due to the focus on internal testing. Wide area of topics, which makes the content a bit too high level at times. One thought that always strike me is the emphasis on the technology. Technology is only a business tool. It is more important to understand your business, manage your people and physical security before you should worry about the technology. What good is all the network and host security if you can either call your business and social engineer passwords or even worse - just walk into your secure areas uncontested and do whatever I want to do? I guess it is easier to control about deal with the logical aspects and technology than irrational people who never do what they are supposed to,

Similar Books:

Title: Snort 2.0 Intrusion Detection
by Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth
ISBN: 1931836744
Publisher: Syngress
Pub. Date: February, 2003
List Price(USD): $49.95
Title: Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)
by Stuart McClure, Joel Scambray, George Kurtz
ISBN: 0072227427
Publisher: McGraw-Hill Osborne Media
Pub. Date: 25 February, 2003
List Price(USD): $49.99
Title: Hacker's Challenge 2: Test Your Network Security & Forensic Skills
by Mike Schiffman, Bill Pennington, David Pollino, Adam J. O'Donnell
ISBN: 0072226307
Publisher: McGraw-Hill Osborne Media
Pub. Date: 18 December, 2002
List Price(USD): $39.99
Title: Stealing the Network: How to Own the Box
by Ryan Russell, Ido Dubrawsky, FX, Joe Grand, Tim Mullen
ISBN: 1931836876
Publisher: Syngress
Pub. Date: 01 April, 2003
List Price(USD): $49.95
Title: Security Warrior
by Cyrus Peikari, Anton Chuvakin
ISBN: 0596005458
Publisher: O'Reilly & Associates
Pub. Date: 01 February, 2004
List Price(USD): $44.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache