Botnets: The Killer Web Applications and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Botnets: The Killer Web Applications on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Botnets: The Killer Web Applications [Paperback]

Craig Schiller , Jim Binkley , Gadi Evron , David Harley , Carsten Willems , Tony Bradley , Michael Cross
5.0 out of 5 stars  See all reviews (1 customer review)
RRP: 33.99
Price: 29.61 & FREE Delivery in the UK. Details
You Save: 4.38 (13%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
In stock.
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Monday, 14 July? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 28.13  
Paperback 29.61  

Book Description

31 Jan 2003
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.

Special Offers and Product Promotions

  • Spend 30 and get Norton 360 21.0 - 3 Computers, 1 Year 2014 for 24.99. Here's how (terms and conditions apply)

Customers Who Bought This Item Also Bought

Product details

  • Paperback: 464 pages
  • Publisher: Syngress (31 Jan 2003)
  • Language: English
  • ISBN-10: 1597491357
  • ISBN-13: 978-1597491358
  • Product Dimensions: 22.4 x 17.8 x 3.6 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,302,277 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

About the Author

Craig A Schiller (CISSP-ISSMP, ISSAP) is the CISO for Portland State University and President of Hawkeye Security Training, LLC. He is the primary author of the first Generally Accepted System Security Principles. He is a co-author of "Combating Spyware in the Enterprise" and "Winternals" from Syngress, several editions of the Handbook of Information Security Management, and a contributing author to Data Security Management. Mr. Schiller has co-founded two ISSA chapters, the Central Plains chapter and the Texas Gulf Coast Chapter.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

4 star
3 star
2 star
1 star
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
***Author's guide to why you might find this book useful***

According to the Symantec Internet Threat Report for Jan-Jun 2006, the UK was the 3rd most likely target of botnet driven DDoS attacks. It was also ranked third in the world for the number of bot infected computers. For the number of attacks which originate in a country, the UK ranked 4th.

Think it's time to find out what's up with all these botnets? Botnets-The Killer Web App will bring you up to speed.

The UK's David Harley contributed his expertise on Botnet Detection along with a collection of international experts, Gadi Evron (Israel), Carsten Willems (Germany), Tony Bradley (USA), Michael Cross (Canada), Jim Binkley (USA), and Craig Schiller (US)

If you are a IT type that needs to come up to speed about botnets quickly, as well as find out what tools and resources are available, this book's for you. If you are a manager that needs to know what the techies are talking about regarding bots, this book's for you. If you are in tech media and need a crash course, this book's for you.

The overviews in chapters 1 and 2 are intended as a presentation resource for management and awareness presentations. They should also help techs understand the big picture.

Chapter 10 on the CWSandbox is so good, the vendor for CWSandbox (Sunbelt Software) is now including it with each copy of CWSandbox they sell.

Chapters 6-9 provide an in-depth discussion of techniques to detect botnets using network traffic analysis as used in the open source ourmon tool. Network security types will probably get the most out of chapters 3, and 5-11.

Chapter 4 was intended as a reference on bot families and capabilities.
Read more ›
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 2.5 out of 5 stars  4 reviews
31 of 35 people found the following review helpful
2.0 out of 5 stars A dissapointment. 15 Feb 2007
By Seal - Published on
To put it bluntly: this book looks like it was written by a high-schooler. The English is simply atrocious, with bad sentence structure, inconsistent use of the past tense, unreferenced demarcation of time... it's just plain poor. Take this sample paragraph:

Early in 2002, SDBot appeared. It was written by a Russian programmer
known as sd. SDBot is a major step up the evolutionary chain for bots. It was
written in C++. More important to the evolution of botnet technology, the
author released the source code, published a Web page, and provided e-mail
and ICQ contact information.This made it accessible to many hackers. It was
also easy to modify and maintain. As a result, many subsequent bot clients
include code or concepts from SDBot.

Then there are the pages of useless information. By useless, I mean quoting pages worth of collection files used by Cain. Or pages worth of court documents on a botnet-related settlement. No highlighting of the most relevant bits, or explanations as to how it pertains to the situation.

Oh, and the book also overtly references Wikipedia as it's prime resource of information for a section on botnet history. Not what Wikipedia may cite - but Wikipedia itself. This is not prime textbook material.

This would of course all be forgivable if the book had some good technical information. But it doesn't. Honestly folks, I thought I didn't know that much about botnets. But everything that's in this book, I already knew - with the exception of how to use Ourmon. This book feels more like a rehash of Symantec's information on popular botnet programs than it does a proper technical text.

The book also references papers that were published in January...2007. Given that the book is on the shelf already (barely a month later), one really has to wonder how much quality control Syngress Publishing puts into it's products. Yeesh.
8 of 8 people found the following review helpful
2.0 out of 5 stars A few good chapters surrounded by weak material 8 Jun 2008
By Richard Bejtlich - Published on
I am wary of Syngress books that consist of a collection of contributions. The quality of the books usually decreases as the number of authors increases. Botnets is no exception, unfortunately. You will probably enjoy chapters by Gadi Evron (Ch 3, Alternative Botnet C&Cs) and Carsten Willems (Ch 10, Using Sandbox Tools for Botnets). I was initially interested in the book because of chapters on Ourmon (Chs 6-9, by Jim Binkley, tool developer). That leaves half the book not worth reading.

Botnets suffers extensively from nonexistent editing. It's clear the authors wrote the text and figures, submitted them to Syngress, and finished their involvement in production. There was clearly no copy or proof editing in this process. Right from the start, Fig 1.1 on p 6 demonstrates the sort of presentation I would expect of a 6th grader. I thought Fig 1.2 on p 18 was an even bigger joke until I read "New Bot Rallys [sic] to let Botherder Know It's [sic] Joined The Team" in Fig 2.1 on p 36. The main text is often as lame as these diagrams, with questions like "How much is the Microsoft bounty for virus authors and how do I get me some?" When the book isn't frustrating readers with poor English, it's repeating sections like the Ancheta and Maxwell cases from Ch 1 reappearing in Ch 2, or yet another "bot overview" in Ch 4 repeating ideas from Ch 1. Are readers expected to pay for this sort of shoddy, unprofessional material?

On the positive side, I thought the chapters on Ourmon were decent. Since Botnets is the only book to cover this useful application, you might want to check them out. I thought Gadi Evron's section, probably written in late 2006 or early 2007, did a good job predicting what actually happened in botnet command and control (specifically with respect to FTP). The CWSandbox chapter was a real surprise, and I think it's the best part of the book. A different publisher might consider given Carsten Willems his own book deal.

Finally, no author should ever post a five star review of his own book on this Web site. I subtracted one star from this review after seeing the lead author give his own book a first review of five stars. That is really disappointing and completely unnecessary.
2.0 out of 5 stars Needs something more 25 Feb 2009
By Nikk Gilbert - Published on
Although containing some valuable nuggets on Botnets and providing a general overview of the threat, the book left me wanting more. The organization of some topics and the treatment of others felt disorganized and lacking the robustness I was looking for. Although interesting, filling up 3 chapters of a 12 chapter book on Ourmon was a bit much as well. Things could have been condensed and edited better which I think would have brought forth the authors intentions more clearly.
1 of 7 people found the following review helpful
4.0 out of 5 stars Understanding BotNets. 27 Jun 2007
By Edgard Padilla - Published on
Format:Paperback|Verified Purchase
Working in the security arena for sometime, this is a must for those of us that wants to understand the underground aspects of BotNet. Good reference for your security library.ed
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category