Top critical review
2 people found this helpful
Not a new book, painting an old car and buffing the dents out doesn't make it new
on 25 April 2011
I'm disappointed that this book, which has such high regard, didn't meet my expectations. I feel they have tried to cover so many topics that they don't give the important ones the time they deserve.
The 6th edition seems to have been "updated" attempting to keep the original information and update the examples. The problem with this approach is that this information is also now out of date. The overview provided by the book is acceptable if you have limited knowledge of IT Security but will not provide any tips or techniques you couldn't get from a tools man page. It is not updated for windows 7 (but does cover vista in places). It is a lot more theoretical than expected and doesn't contain any real usable examples.
I skipped the whole section on war dialling and modems. This seemed like a total waste of paper to me. Insult was added to injury when i found that malware has a small sub section towards the end of the book within hacking the internet user. In my opinion from a modern security point of view this is one of the most important factors. While it may not be perceived by some as "Hacking" i really don't think it was given the coverage it deserves.
I started to get pretty annoyed with every single countermeasure starting with the line if you don't use it turn it off and being followed up with apply a patch. There are also lots of sales pitches and reference to other hacking exposed books.
The book can be summed up in my opinion by this quote from it:" we simultaneously wanted to breathe a sigh of relief and to embark on years of further research into Internet user hacking. Indeed, we left some highly publicised attacks on the cutting room floor, due primarily to an inability to keep up with the onslaught of new attacks against Internet end users."