Hacking Exposed: Network Security Secrets & Solutions, 3/e Paperback – 31 Oct 2001
There is a newer edition of this item:
Customers Who Bought This Item Also Bought
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.
The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.
Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient
From the Back Cover
"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more." Lance Spitzner, Sun Microsystems GESS Security Team and the coordinator of the Honeynet Project
"Whether you're a struggling novice or a seasoned pro Hacking Exposed, Third Edition is required reading." Barnaby Jack, Win32 Buffer Overflow expert
CD-ROM contains key security tools ready to install on your computer, links to the security tools covered in the book, and a password database.
Harden your computers and networks against compromise by digital marauders today with this fully revised, essential volume. Hacking Exposed: Network Security Secrets ; Solutions, Third Edition shows you how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Renowned security experts Stuart McClure, Joel Scambray, and George Kurtz provide detailed examples of the latest devious break-ins and destructive attacks and show you, step-by-step, how to protect your systems. You'll get brand-new coverage of technologies like 802.11 Wireless Networking expanded coverage of Denial of Service, VPN, dial-up, and remote access hacks, and all-new security information on Windows XP, Windows.NET Server (code named Whistler), and IIS 5.
New and Updated Material:
-The latest 802.11 Wireless networking security attacks and countermeasures
-Fully up-to-date information on the latest Windows, UNIX, Linux, and NetWare hacks and countermeasures in the tried-and-true Hacking Exposed format
-New techniques used by today's hacker to pinpoint potential targets ping sweep tools, TCP/UDP scans, traceroutes, whois queries, and zone transfer downloads
-Significantly revised chapters on analog dial-up and Web attacks
-Brand-new coverage of Windows XP, Windows.NET Sever (code named Whistler), and IIS 5 vulnerabilities like Code Red
-New UNIX material including the latest Format String vulnerabilities
-The latest remote control vulnerabilities in VNC and Terminal Server
-New strategies for preventing untrusted access to SNMP, Active Directory, and NetBIOS/SMB services using IPSec filters, firewalls, and TCP/IP Security
-The most recent techniques for securing and managing Microsoft SQL Server and Internet Clients in networked environments See all Product Description
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
The good thing about this book is that not only does it tell you how to exploit a security hole but also how to close it to avoid the intrusion in the first place. Get this book, it is well worth it
The book goes through real life examples taking you through the steps from picking up hack signatures to reporting the faults and fixes to the hack.
It will take you through cleint and server security flaws, from SQL database, web servers and beyond.
The book puts you in the shoes of a hacker and as we all know...to beat a hacker you have to think like a hacker.
A must buy, simple as that.
Most Recent Customer Reviews
There is one , Hacking Exposed already the third version is in print and it is safe to say it is as close to a security bestseller that there is. Read morePublished on 26 Jun. 2002