3 of 4 people found the following review helpful
on 31 August 2008
This has the wrong title I think, its basically what to do to prevent getting hacked, what configuration settings to apply and a lot of niche stuff you wouldn't really see much in the wild unless you have a spectrum analyser and you are going after a big corporate with very local access i.e.tempest issues. Hardly anything on tools as you get in normal hacking exposed books, very poor especially with the quality of the authors who have contributed, alot of old stuff i.e. telnet, finger, rhosts et al are still being used and these should be referenced as they are still stalwarts for getting access to a network, I think this book is coming from the wrong angle totally from every other one in the series I have read. There are a few new bits in there i.e. a little bit on web apps but these are generally glossed over. I am pleased I pre-ordered in feb and got this book for £15 but I'm not sure its worth that, alot of better books out there.