Shop now Shop Clothing clo_fly_aw15_NA_shoes Shop All Shop All Amazon Fashion Cloud Drive Photos Shop Fire TV Shop now Shop Fire HD 6 Shop Kindle Paperwhite Shop now Shop Now Shop now

Customer Reviews

2
1.0 out of 5 stars
5 star
0
4 star
0
3 star
0
2 star
0
1 star
2

Your rating(Clear)Rate this item
Share your thoughts with other customers

There was a problem filtering reviews right now. Please try again later.

3 of 3 people found the following review helpful
on 22 August 2008
Should not be a Hacking Exposed book.

I would recommend the following book instead to anyone looking to learn how to hack a Linux system: Hacking Exposed Linux, 2nd Edition: Linux Security Secrets and Solutions (Hacking Exposed)

If you are a sys admin looking to secure a Linux system then this is certainly a book that deserves a slot on your bookshelf as it contains cutting edge information on how to keep a Linux system secure (as you would expect from ISECOM) and it will be extremely useful to you in this respect, but buy the earlier version if you are looking to learn how to hack Linux, as you will not learn any hacking methods from this book whatsoever. To be fair, the back cover does say you will learn about securing Linux and makes no mention of covering hacking topics.

My gripe is that it should not be sold under the Hacking Exposed brand name.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 4 people found the following review helpful
on 31 August 2008
This has the wrong title I think, its basically what to do to prevent getting hacked, what configuration settings to apply and a lot of niche stuff you wouldn't really see much in the wild unless you have a spectrum analyser and you are going after a big corporate with very local access i.e.tempest issues. Hardly anything on tools as you get in normal hacking exposed books, very poor especially with the quality of the authors who have contributed, alot of old stuff i.e. telnet, finger, rhosts et al are still being used and these should be referenced as they are still stalwarts for getting access to a network, I think this book is coming from the wrong angle totally from every other one in the series I have read. There are a few new bits in there i.e. a little bit on web apps but these are generally glossed over. I am pleased I pre-ordered in feb and got this book for £15 but I'm not sure its worth that, alot of better books out there.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
     
 
Customers who viewed this item also viewed

Rtfm: Red Team Field Manual
Rtfm: Red Team Field Manual by Ben Clark (Paperback - 11 Feb. 2014)
£4.94

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition by Branko Spasojevic (Paperback - 1 Feb. 2015)
£26.03
 
     

Send us feedback

How can we make Amazon Customer Reviews better for you?
Let us know here.