Buy Used
Used - Very Good See details
Price: £0.01

or
 
   
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Tell the Publisher!
I’d like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Hacking Exposed: Network Security Secrets and Solutions (Network Professional's Library) [Paperback]

Stuart McClure , Joel Scambray , George Kurtz
4.5 out of 5 stars  See all reviews (14 customer reviews)

Available from these sellers.


Formats

Amazon Price New from Used from
Paperback --  
There is a newer edition of this item:
Hacking Exposed: Network Security Secrets and Solutions, 4th edition Hacking Exposed: Network Security Secrets and Solutions, 4th edition 5.0 out of 5 stars (5)
Currently unavailable

Book Description

1 Oct 1999 0072121270 978-0072121278
Systems administrators are often unaware of the dangers presented by anything beyong the most trivial attacks. Because of the day-to-day tasks, Y2K projects, and increasingly complex technology, administrators have perpetually back-burnerer security issues out of necessity. However, recent high-profile viruses and events like the White House website being closed down by hackers has brought the issue back to the forefront. With Hacking Exposed: Network Security Secrets and Solutions, Osborne will provide administrators with a modular and approachable reference so they can select the most pertinent information, rapidly digest it, and apply it immediately.

Product details

  • Paperback: 550 pages
  • Publisher: Osborne/McGraw-Hill (1 Oct 1999)
  • Language: English
  • ISBN-10: 0072121270
  • ISBN-13: 978-0072121278
  • Product Dimensions: 18.5 x 3.3 x 23.5 cm
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (14 customer reviews)
  • Amazon Bestsellers Rank: 1,848,727 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

Amazon Review

There are dozens of books detailing the careers of malicious hackers and plenty more on security techniques. What makes Hacking Exposed different is that it combines the best of both worlds, giving you an insight into the techniques and mindset of crackers without glamorizing or mystifying what they get up to--and then telling you how to keep them out of your system by explaining exactly what they'll try to do to get in.

There are security options in every operating system and any competent sysadmin will know what they are and how to use them: you may even be able to keep up with all the service packs and patches that come out. What you probably don't know is all the potential holes in your security and the tools that will be used to try to get into your system. This book will scare you thoroughly by explaining each type of attack on your network. But it then tells you how to deal with the security hole of which each attack takes advantage. The explanations are clear and detailed and cover UNIX and Linux, Windows 95, 98 and NT (with an appendix on Windows 2000), Novell NetWare and common firewalls and mail servers too. The problem is always growing, but the coverage is reasonably up-to-date and points you at some useful resources, including the companion Web site at www.hackingexposed.com.

The obvious worry with a book like this is that it will help the crackers as much as the sysadmins it's written for. But security through obscurity is no security--and anyway all of these intrusion tools and techniques are out there on the Net already for those with the time and inclination to look for them. Learning how vulnerable your network is to password crackers and direct attacks or seeing how easily intruders can find out about your systems and take advantage of your resources--and getting a step-by-step guide to keeping them out--is your best defence. --Penny Jannifer


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

4.5 out of 5 stars
4.5 out of 5 stars
Most Helpful Customer Reviews
2 of 2 people found the following review helpful
By A Customer
Format:Paperback
This book make a fascinating read. It is written almost as a hacker's notebook, detailing how a system is targetted and then attacked. Fortunately the book didn't scare me, instead it did reassure me as I was aware of most of the techniques discussed. But the value lays in the way that the book is a summary of all those thousands of web pages discussing vulnerabilities and hacking tools. The book is less than 500 pages yet still covers the pre-amble to an attack and the major weakness (and how to exploit them) of Win 9x, NT 4, Novell and Unix along with other sections on Windows 2000, network devices, firewalls, web servers etc. Some knowledge of Unix and NT services and TCP/IP is assumemed, but it makes a refreshing change to have a book that isn't 1000 pages of padding taken up by TCP/IP and the history of the Internet (again!).
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Security Consultants had better read this! 28 Feb 2000
By A Customer
Format:Paperback
This book will become the bible for wannabe script kiddies everywhere. The book explains how to conduct an attack against most sorts of computers and network elements and then describes how to circumvent the exploit. Basically, if the attackers are reading the former then you had better have read and implemented the latter. If you only have one book in your armoury then this should be it. Well written and interesting it thoroughly deserves to be a best seller, at least in the computer security industry. I would have given it the 5th star had there been an accompanying CDROM with the various tools mentioned in the book but the companion website is nevertheless very good.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
By A Customer
Format:Paperback
I initially thought that my NT systems were as secure as they needed to be but after reading this book it has really opened my eyes to the mutliple methods that can be employed to break into systems. If you have any external links be it dialup access, permanent internet connection you must read this book. Even if you don't it is imperative you read this book to prevent unauthorised access from your 'trusted' local users !
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
Format:Paperback
i am not a system adminsitrator just a normal computer user i dont want people to "hack" my computer so i bought this book to find out how to stop them. and it has worked i now follow a simple set of rules from the book when on the internet. if you are paronied (which you should be) on the net then get this NOW! it might just save your computer!
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
5.0 out of 5 stars Be Scarred of this Book 5 July 2000
By A Customer
Format:Paperback
Does exactly what it says on the tin.
How to hack into nearly all networks and systems. If you have Netware, NT, Unix, Linux, routers or dial-up networking then you MUST read this.
Gives simple instructions on the easiest ways to close up the loopholes. If you value your data then you MUST read.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
By A Customer
Format:Paperback
A very interesting and worth while book to read. Very good with lots of info on hacking, both how to hack and how to prevent it. Could have been better with a CD with the tools explained but Hackers 2000 2cd rom has everything u need on it which is explained on it, better of buying both of them!
Comment | 
Was this review helpful to you?
Format:Paperback
This book is a must for system administrators. I've been studying Unix security for many years, and the authors of this book know what they are talking about! It is easy reading, but goes down to sufficient level of detail to give you a complete understanding (or points you to the appropriate URL)
It contains detail on scanning and securing:
* Windows 95/98
* Windows NT
* Novel Netware
* UNIX
* Dial Up lines
* Routers
* Firewalls
* Web Servers
The only complaint I have about the book is that it does not come with a CD containing all the tools referenced. Yes, they are available from the book's FTP site, but I distrust any programs downloaded from the Net, and the book does not warn the reader about how to treat downloaded programs.
Nevertheless, I cannot recommend this book highly enough.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
4.0 out of 5 stars A must read for 'newbies'
If your a newbie in the world of computer security and fed up with trying to find answers on the internet then this is a definate book to read. Read more
Published on 13 Dec 2000
2.0 out of 5 stars Pretty Average !
This book covers common 'sploits that all the klubies and kiddies try to run against evert network / system that happens to be running an effected deamon. Read more
Published on 8 Sep 2000
4.0 out of 5 stars excellenn introduction
This is a good intro into cracking. Though it is a bit hands on. For this matter it would have helped to have the utilities described on cd rom. Read more
Published on 5 May 2000
4.0 out of 5 stars Excellent start into the darker world of IT
If you want to hack the planet buy this book. A CD with all the tools reviewed would have made this book worthy of 5 stars
Published on 19 Feb 2000 by mat.rix@virgin.net
5.0 out of 5 stars The Bees Knees
An excellent book. Broad in scope but not shallow in detail. If you could own only one book on hacking techniques and countermeasures, this should be it!
Published on 26 Jan 2000 by s.d.birchall@surveying.salford.ac.uk
5.0 out of 5 stars The most useful computer security book released, ever!!!
This book is excellent in that it covers every exploit that is currently viable against your network and (fortunately) tells you how to fix it, very comprehensive in its... Read more
Published on 26 Jan 2000
5.0 out of 5 stars The definitive contemporary hands-on guide to net' security
Written by skilled practitioners for soon-to-be skilled practitioners. All the main areas are covered (which is not that new) but it is done with reference to a method for... Read more
Published on 7 Dec 1999
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback