Hacking Exposed: Network Security Secrets and Solutions, 4th edition Paperback – 1 Feb 2003
There is a newer edition of this item:
Customers who bought this item also bought
What other items do customers buy after viewing this item?
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Would you like to tell us about a lower price?
If you are a seller for this product, would you like to suggest updates through seller support?
Microsoft has finally decided to publicly support network security in Windows XP, a new area covered in the third edition of bestseller, Hacking Exposed. Other new coverage includes attacks on 802.11 wireless networks. But despite details of recent high-profile worms such as Code Red, most of the material is carried over pretty well unchanged from earlier editions.
The guts of Hacking Exposed remain devoted to explaining operating systems, switch and network vulnerabilities--used by the bad guys to get in--and how to remove them. The solutions--apart from the material on social engineering--can require an understanding of network and operating system protocols, user privileges, validation, encryption, file systems and other arcana--though the explanations supplied are detailed enough for the interested user to understand and apply firewalls, security patches, effective authentication and other effective security measures. The book is supported by a Web site with useful network analysis and other tools you can use to investigate and harden your own systems.
Hacking Exposed remains one of the most accessible books available on network security and the latest version is excellent. However, while new vulnerabilities continue to be found the basics remain the same. If Hacking Exposed were software the third edition would be a free upgrade for registered users. Even so, it should be compulsory reading for sysadmins everywhere. --Steve Patient --This text refers to an out of print or unavailable edition of this title.
From the Back Cover
"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." Bill Machrone, PC Magazine
"Reading this book is better than hiring those Sneakers guys to break into your network to tell you where the open doors are, and it doesn't cost nearly as much." Professional Certification magazine
"A great practical guide for administrators and an eminently readable expose on hacking that should smooth the way for sensible executive policies to protect corporate networks." Cameron Sturdevant, eWeek
"Will tell you more about what hackers have done and can and can't do than anything else I have seen....Chock full of tips on countermeasures and just plain usability tricks. Recommended." Jerry Pournelle, BYTE Magazine
"For almost any computer book, you can find a clone. But not this one.... A one-of-a-kind study of the art of breaking in." UNIX Review
New and Updated Material:
-Each part opens with a brand new case study based on real security scenarios
-Brand new chapter covers the latest 802.11 Wireless networking security attacks and countermeasures
-New strategies for proactively defending against dial-up, PBX, voicemail, and VPN hacks
-Completely rewritten enumeration chapter including new SQL Server discovery tools, Windows XP/.NET Server countermeasures, Novell exploits, and network discovery using BGP
-New techniques for gaining unauthorized access to Windows 9x/Me/NT/2000/XP, Novell 6, UNIX, and Linux
-Up-to-date countermeasures for preventing the exploitation of proxy and packet filtering firewall vulnerabilities
-Web hacking chapter completely revised and updated to cover the latest platform-specific vulnerabilities from Apache to IIS, current techniques including cross-site scripting, fuzzing, and SQL injection attacks, and all of the latest tools from Achilles to Nikto
Hacking Exposed Live! video presentation on DVDSee all Product description
Top customer reviews
The good thing about this book is that not only does it tell you how to exploit a security hole but also how to close it to avoid the intrusion in the first place. Get this book, it is well worth it
The book goes through real life examples taking you through the steps from picking up hack signatures to reporting the faults and fixes to the hack.
It will take you through cleint and server security flaws, from SQL database, web servers and beyond.
The book puts you in the shoes of a hacker and as we all know...to beat a hacker you have to think like a hacker.
A must buy, simple as that.
Sure you might spend days looking for all the information and sure you will find it but this book is what real life is all about and will save your bacon before attackers cook it.
The best part is the Hacking Linux Expose book, it shut a few Linux eyes only people up for once and Linux users also have thier own security problems to solve.
McGraw hill has taken the risk along time ago and it has paid off big for them. Thanks for publishing this book.
When is the Hacking OSX Book comming??
Would you like to see more reviews about this item?
Look for similar items by category