Buy Used
+ £2.80 UK delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See more of our deals.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed: Network Security Secrets & Solutions, 3/e Paperback – 31 Oct 2001

5.0 out of 5 stars 6 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
£2.54 £0.01

There is a newer edition of this item:

click to open popover

Special Offers and Product Promotions

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

Product details

  • Paperback: 740 pages
  • Publisher: Osborne/McGraw-Hill; 3rd Revised edition edition (31 Oct. 2001)
  • Language: English
  • ISBN-10: 0072193816
  • ISBN-13: 978-0072193817
  • Product Dimensions: 23.1 x 18.7 x 4.6 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Bestsellers Rank: 954,570 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

Amazon Review

Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.

The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.

Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient

From the Back Cover

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more." Lance Spitzner, Sun Microsystems GESS Security Team and the coordinator of the Honeynet Project

"Whether you're a struggling novice or a seasoned pro Hacking Exposed, Third Edition is required reading." Barnaby Jack, Win32 Buffer Overflow expert

CD-ROM contains key security tools ready to install on your computer, links to the security tools covered in the book, and a password database.

Harden your computers and networks against compromise by digital marauders today with this fully revised, essential volume. Hacking Exposed: Network Security Secrets ; Solutions, Third Edition shows you how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks. Renowned security experts Stuart McClure, Joel Scambray, and George Kurtz provide detailed examples of the latest devious break-ins and destructive attacks and show you, step-by-step, how to protect your systems. You'll get brand-new coverage of technologies like 802.11 Wireless Networking expanded coverage of Denial of Service, VPN, dial-up, and remote access hacks, and all-new security information on Windows XP, Windows.NET Server (code named Whistler), and IIS 5.

New and Updated Material:

-The latest 802.11 Wireless networking security attacks and countermeasures
-Fully up-to-date information on the latest Windows, UNIX, Linux, and NetWare hacks and countermeasures in the tried-and-true Hacking Exposed format
-New techniques used by today's hacker to pinpoint potential targets ping sweep tools, TCP/UDP scans, traceroutes, whois queries, and zone transfer downloads
-Significantly revised chapters on analog dial-up and Web attacks
-Brand-new coverage of Windows XP, Windows.NET Sever (code named Whistler), and IIS 5 vulnerabilities like Code Red
-New UNIX material including the latest Format String vulnerabilities
-The latest remote control vulnerabilities in VNC and Terminal Server
-New strategies for preventing untrusted access to SNMP, Active Directory, and NetBIOS/SMB services using IPSec filters, firewalls, and TCP/IP Security
-The most recent techniques for securing and managing Microsoft SQL Server and Internet Clients in networked environments

See all Product Description

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 6 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
Having read this book it made me realise how easy it can be to leave holes behind. If you are thinking of becoming a network security administrator or a security consultant this book will definitely enhance your knowledge.
The good thing about this book is that not only does it tell you how to exploit a security hole but also how to close it to avoid the intrusion in the first place. Get this book, it is well worth it
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Despite this edition being fairly old now, I still refer to it quite frequently. If you're already working in a security related field, you will most likely be aware of the majority of the tools the author discusses, but the organized approach to the chapters makes it worthwhile reading when you're doing a security audit anyway - to make sure you don't miss anything. Also, you may still pick up a trick or two.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book is THE BIBLE to the practical approach to IT security.
The book goes through real life examples taking you through the steps from picking up hack signatures to reporting the faults and fixes to the hack.
It will take you through cleint and server security flaws, from SQL database, web servers and beyond.
The book puts you in the shoes of a hacker and as we all beat a hacker you have to think like a hacker.
A must buy, simple as that.
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse