Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed
. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.
The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.
Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient
From the Publisher
Right Now, Who is Breaking Into Your Computer?
Anyone who is connected to the Internet for any stable length of time is a potential victim. From large companies like Yahoo.com, eBay, and Amazon to organisations like universities and even average consumers on a cable modem or DSL connection, Internet security is everybodys business.
Every type of end user can understand and implement ways to prevent attacks by reading the second edition of the worlds most popular network security book, Hacking Exposed, by Stuart McClure, Joel Scambray, and George Kurtz. In addition to being partners in Foundstone, Inc., a premier security consulting and training company, authors McClure, Scambray and Kurtz have promoted information system security over a combined fifteen years for Fortune 500 companies, and in forums including weekly columns in InfoWorld.
Since its release in the autumn of 1999, more than 125,000 copies of the first edition of Hacking Exposed have been sold world-wide making it an international best seller.
Why the need for a second edition? The world of Internet security moves even faster than todays round-the-clock digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here.
In his foreword to the Second Edition, Internet security titan Bruce Schneier, CTO of Counterpane Internet Security Inc., calls Hacking Exposed "
the distilled essence of the full-disclosure movement. Its a comprehensive bible of security vulnerabilities: what they are, how they work, and what to do about them. After reading this, you will know more about your network and how to secure it than any other book I can think of. This book is informational gold." Read a copy today to see what you or your ebusiness may be missing.
--This text refers to an out of print or unavailable edition of this title.