Buy Used
£0.98
+ £2.80 UK delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See more of our deals.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed: Network Security Secrets & Solutions, 3/e Paperback – 31 Oct 2001


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback, 31 Oct 2001
£15.37 £0.98

There is a newer edition of this item:



Product details

  • Paperback: 740 pages
  • Publisher: Osborne/McGraw-Hill; 3rd Revised edition edition (31 Oct. 2001)
  • Language: English
  • ISBN-10: 0072193816
  • ISBN-13: 978-0072193817
  • Product Dimensions: 23.1 x 18.7 x 4.6 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Bestsellers Rank: 1,205,985 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

Amazon Review

Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.

The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.

Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient

From the Back Cover

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more." Lance Spitzner, Sun Microsystems GESS Security Team and the coordinator of the Honeynet Project

"Whether you're a struggling novice or a seasoned pro Hacking Exposed, Third Edition is required reading." Barnaby Jack, Win32 Buffer Overflow expert

CD-ROM contains key security tools ready to install on your computer, links to the security tools covered in the book, and a password database.

Harden your computers and networks against compromise by digital marauders today with this fully revised, essential volume. Hacking Exposed: Network Security Secrets ; Solutions, Third Edition shows you how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Renowned security experts Stuart McClure, Joel Scambray, and George Kurtz provide detailed examples of the latest devious break-ins and destructive attacks and show you, step-by-step, how to protect your systems. You'll get brand-new coverage of technologies like 802.11 Wireless Networking expanded coverage of Denial of Service, VPN, dial-up, and remote access hacks, and all-new security information on Windows XP, Windows.NET Server (code named Whistler), and IIS 5.

New and Updated Material:


-The latest 802.11 Wireless networking security attacks and countermeasures
-Fully up-to-date information on the latest Windows, UNIX, Linux, and NetWare hacks and countermeasures in the tried-and-true Hacking Exposed format
-New techniques used by today's hacker to pinpoint potential targets ping sweep tools, TCP/UDP scans, traceroutes, whois queries, and zone transfer downloads
-Significantly revised chapters on analog dial-up and Web attacks
-Brand-new coverage of Windows XP, Windows.NET Sever (code named Whistler), and IIS 5 vulnerabilities like Code Red
-New UNIX material including the latest Format String vulnerabilities
-The latest remote control vulnerabilities in VNC and Terminal Server
-New strategies for preventing untrusted access to SNMP, Active Directory, and NetBIOS/SMB services using IPSec filters, firewalls, and TCP/IP Security
-The most recent techniques for securing and managing Microsoft SQL Server and Internet Clients in networked environments

Inside This Book (Learn More)
First Sentence
Before the real fun for the hacker begins, three essential steps must be performed. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
5
4 star
0
3 star
0
2 star
0
1 star
0
See all 5 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

5 of 5 people found the following review helpful By JPR on 14 Mar. 2006
Format: Paperback Verified Purchase
Having read this book it made me realise how easy it can be to leave holes behind. If you are thinking of becoming a network security administrator or a security consultant this book will definitely enhance your knowledge.
The good thing about this book is that not only does it tell you how to exploit a security hole but also how to close it to avoid the intrusion in the first place. Get this book, it is well worth it
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Quinda on 11 Sept. 2009
Format: Paperback
Despite this edition being fairly old now, I still refer to it quite frequently. If you're already working in a security related field, you will most likely be aware of the majority of the tools the author discusses, but the organized approach to the chapters makes it worthwhile reading when you're doing a security audit anyway - to make sure you don't miss anything. Also, you may still pick up a trick or two.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 5 people found the following review helpful By MR S S BHACHU on 11 Feb. 2005
Format: Paperback
This book is THE BIBLE to the practical approach to IT security.
The book goes through real life examples taking you through the steps from picking up hack signatures to reporting the faults and fixes to the hack.
It will take you through cleint and server security flaws, from SQL database, web servers and beyond.
The book puts you in the shoes of a hacker and as we all know...to beat a hacker you have to think like a hacker.
A must buy, simple as that.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 12 people found the following review helpful By A Customer on 26 Jun. 2002
Format: Paperback
There is one , Hacking Exposed already the third version is in print and it is safe to say it is as close to a security bestseller that there is. This book walks you through everything you need to know about how hackers do their work and the best part the the good guys (Security Professional) it also tells you how to implement counter measures or what risks are associated.
Sure you might spend days looking for all the information and sure you will find it but this book is what real life is all about and will save your bacon before attackers cook it.
The best part is the Hacking Linux Expose book, it shut a few Linux eyes only people up for once and Linux users also have thier own security problems to solve.
McGraw hill has taken the risk along time ago and it has paid off big for them. Thanks for publishing this book.
When is the Hacking OSX Book comming??
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 14 people found the following review helpful By A Customer on 14 Dec. 2001
Format: Paperback
Simply one great book. I was really interested in "security" stuff, but not experienced at all. This book, besides an intriguing look, provides a simple, detailed approach to hacking. Buy it, if you need something on hacking.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again


Feedback