Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

The Real Hacker's Handbook Paperback – 7 Jul 2011

4.8 out of 5 stars 4 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback
"Please retry"
£40.29
Paperback, 7 Jul 2011
£70.84 £11.85
click to open popover

Special Offers and Product Promotions

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.




Product details

  • Paperback: 272 pages
  • Publisher: Carlton Books Ltd; 4th edition (7 July 2011)
  • Language: English
  • ISBN-10: 1847328253
  • ISBN-13: 978-1847328250
  • Product Dimensions: 19.6 x 12.7 x 2.5 cm
  • Average Customer Review: 4.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Bestsellers Rank: 944,323 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

About the Author

Described by the BBC as "author and chronicler of the hacking scene", Dr.K is a veteran IT specialist and "old school" hacker who has worked with computers for over 23 years. Dr.K wrote Complete Hacker's Handbook (Carlton 2000, second edition 2002, third edition 2008) and Hackers' Tales (Carlton 2004). He lives off the grid.


What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

4.8 out of 5 stars
5 star
3
4 star
1
3 star
0
2 star
0
1 star
0
See all 4 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
OK, confession time - I didn't come to this title to learn how to break into anything, I just wanted an overview of the state of the art, and...

Well, it's OK. There's some useful discussion around how data protocols work, handshaking and phreaking, but there is a lot of tacit knowledge there that you will have to dig around to really put into context if you want the low-level nitty-gritty on the differences between TCP and UDP and what-have-you.

There are a few typos and grammatical errors that really, IMHO, should have been picked up in subediting ("illusive"... do you mean "elusive"), which sort of suggest that whoever has read through this book to check it has skimmed it a bit, which is sort of faint praise for its readability.

Not awful, and far less sensationalist and more accessible than many books on this topic, but don't come to it expecting to come out the other side of it as a l33t h4x0r, OK?
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Very interesting so far. Very apposite. very detailed. But a lot of understandable stuff. Helpful to my IT consultancy business.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By mr j on 18 Nov. 2012
Format: Paperback Verified Purchase
Excellent update from the original. If you enjoyed the other two editions you will love this.
Buy it, read it, love it!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Great.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 3.6 out of 5 stars 5 reviews
5 of 5 people found the following review helpful
3.0 out of 5 stars Not really a handbook 24 Sept. 2011
By psimoes - Published on Amazon.com
Format: Paperback
This book isn't really a handbook for hackers or wannabes, mainly for those expecting tools and cutting-edge techniques. This is more a kind of historical reference, reporting all the entities involved in this universe of hacking. The Section 1 introduces well the reader to the world of hacking with a good presentation of the most famous hackers and their related activities. This section gave me motivation to continue the reading. Next, the Section 2 and for me the big flaw of this book. The Tools chapter presents some software that is somewhat outdated and not fits very well in a hacker's toolkit. For example, a firewall, is used to defend the network perimeter not to develop a penetration test, that is more what a hacker is aimed to. After seeing that there was a Techniques chapter, I expected more than just some basic TCP/IP, enumeration with telnet, some superficial DNS techniques and ping stuff. The Telecom and WIFI chapter seems to happen 5 year ago, as it suggests WEP implementation to defend against attacks, very bad for a 2011 book. The next chapters are ok, but in the Internet Threats I miss some modern attacks such as XSS, CSRF, SQLi, etc. In section 3, my motivation returned as the author talks about cyber-warfare, criminal stuff, investigations, Al-quaeda, etc. This section shows well the big intervention of today's hacking scene in war and crime. The last section 4, it's just a big conclusion of all the themes talked in the rest of the book and doesn't add to much knowledge to it. For a 2011 title it lacks some modern technology that overrides the old one.
4.0 out of 5 stars A good intro book. 1 Feb. 2013
By px - Published on Amazon.com
Format: Paperback
The first version of this book is what got me started in my infosec career. It turned a passing interest that I had in computer security into a full on obsession that's lasted with me for more than 10 years now.

This is a good book to buy for a middleschool/highschool kid, but not really something that can be used as reference material, and definitely not something that would be interesting to someone who is already a professional in the field. It does a good job of de-mystifying the internet, and allowing the reader to stop viewing it as a magical place of electrons and wonder, and see it for the garbled mess of poorly managed servers and routers that it really is.
5.0 out of 5 stars Great book 25 Dec. 2013
By John Foster - Published on Amazon.com
Format: Paperback Verified Purchase
This book has a wealth of information that other books of its kind just don't touch. Its technically sound and educational
4.0 out of 5 stars Four Stars 17 April 2015
By Kelly Jewett - Published on Amazon.com
Format: Paperback Verified Purchase
The book was exactly as expected and was in good physical condition.
1 of 4 people found the following review helpful
2.0 out of 5 stars Borderline pathetic 22 Sept. 2011
By ISeeRed - Published on Amazon.com
Format: Paperback
Goes over very, very basic stuff that professionals would not dare have in their collection, most of this can be found online. The material is very basic, has errors, and doesn't cover enough material like it should. Sorry, not enough to be a "hacker." If you have to read a book to "become a hacker," enjoy the slope down to failure. Go take a college class or get into ISSA conferences for the real material.
Were these reviews helpful? Let us know

Look for similar items by category


Feedback