Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions: Network Security Secrets and Solutions Paperback – 1 Feb 2009
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
There is a newer edition of this item:
Customers Who Bought This Item Also Bought
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.
Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.
George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.
They are the bestselling coauthors of the five previous editions of Hacking Exposed.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
This book tries to cover every aspect of IS and exploits and it manages to do quite a good job. Of course it is not oriented to a particular technology as it touches many different topics such as Windows, Unix, Web Application hacking as well as hacking tools.
What most people like in this book is the way every possible attack is approached and the structure it is presented through (Threat Evaluation, Attack Explanation, Mitigation/Countermeasures). This is an excellent entry point for somebody needing to gain an overall picture of possible threats, well known attack vectors and corresponding countermeasures.
One issue with the book, that I kept being reminded of, is that it is an updated version of something first written over 10 years ago. This problem seemed to appear most obviously in the guidance on countermeasures, e.g. warning that disabling TCP/T may be undesirable, despite the fact that this unusual TCP extension has never seen any significant adoption, and advising contacting InterNIC about information shown in whois, reflecting the domain name industry as it was a decade ago rather than how it operates today.
The 6th edition seems to have been "updated" attempting to keep the original information and update the examples. The problem with this approach is that this information is also now out of date. The overview provided by the book is acceptable if you have limited knowledge of IT Security but will not provide any tips or techniques you couldn't get from a tools man page. It is not updated for windows 7 (but does cover vista in places). It is a lot more theoretical than expected and doesn't contain any real usable examples.
I skipped the whole section on war dialling and modems. This seemed like a total waste of paper to me. Insult was added to injury when i found that malware has a small sub section towards the end of the book within hacking the internet user. In my opinion from a modern security point of view this is one of the most important factors. While it may not be perceived by some as "Hacking" i really don't think it was given the coverage it deserves.
I started to get pretty annoyed with every single countermeasure starting with the line if you don't use it turn it off and being followed up with apply a patch. There are also lots of sales pitches and reference to other hacking exposed books.
The book can be summed up in my opinion by this quote from it:" we simultaneously wanted to breathe a sigh of relief and to embark on years of further research into Internet user hacking. Indeed, we left some highly publicised attacks on the cutting room floor, due primarily to an inability to keep up with the onslaught of new attacks against Internet end users."
Most Recent Customer Reviews
Absolutely brilliant book for students of network security looking for a view from behind the malicious hackers mind so we can prevent systems from being hacked
I actually came across this book while in University. It was very interesting alot of excellent examples to go through and try out. Bought to keep in my collection.Published on 7 May 2012 by T Stark