Skip to content
Paperback Hackers Beware: The Ultimate Guide to Network Security Book

ISBN: 0735710090

ISBN13: 9780735710092

Hackers Beware: The Ultimate Guide to Network Security

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$6.59
Save $38.41!
List Price $45.00
Almost Gone, Only 1 Left!

Book Overview

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about... This description may be from another edition of this product.

Customer Reviews

5 ratings

Finally, a readable book about network security!

I'll be brief. If you are a layman, and you don't have much expertise in the computer security field, then read this book. "Hackers Beware" does assume some prior general knowledge about networking and software, but anybody who's taken a few courses, or had a bit of on-the-job experience will be able to follow along quite well.Even better, if you are a business owner, and are worried about the security of your network (and believe me, you should be), then reading this book will give you the added advantage of being able to communicate intelligently with you network security personnel. Further, after having studied this accessible tome, you will be able to discern as to whether your networking people actually know what they are dealing with (sadly, some don't. You know 'em and I know 'em. Yes, I'm refering to the PAPER MCSE's). Being able to speak intelligently with your employees, and put your heads together in solving the formidible problem of network security, will be of limitless benefit to you.All in all, an understandable, mostly-in-plain-English book that will behoove all who read it.

Excellent security information resource

I am not a system admin nor do I play one on TV. However being a computer professional, I have an interest in the topic of network security, and how crackers and "script kiddies" infiltrate network systems. This book offers a wealth of network security information that even "novices" like myself can easily follow. And in some of the examples Cole discusses, it's almost scary to discover how easy it is for someone with even a little bit of knowledge to infiltrate a computer network. Cole's book while dauntingly large contains a wealth of information that any security professional should know about. One of my sys admin friends was commenting to me that books like Cole's allow the "script kiddies" to learn about exploits without doing any of the work that a "black hat (cracker)" or "white hat (hacker)" might do to exploit a system. However big a risk that may possibly be, I still feel it's best for any security professional to be informed about all the various types of exploits they may deal with. And with a book of this size, there are obviously lots of them to discuss.Cole discusses exploits against Linux, UNIX, Windows, and Windows NT and the myriad of programs (password crackers, network sniffers, back door programs, etc.) designed to break into other people's systems. Each program is described in full and what it does. Cole also offers suggestions and solutions in various chapters to keep unauthorized users from accessing various systems.While you will never be 100% safe from an "attack," Cole's book offers ways to keep your system from being attacked or ensure that the chances of it actually happening remain remote, or the "damage" from such attacks stays minimal.

Gives 'Hacking Exposed' a run for its money

While Hackers Beware may not be the `Ultimate Guide to Network Security' in my opinion, it still is nonetheless an excellent book on how networks attacks are performed.The book details how attackers gain access into different type of operating systems and hardware platforms. More importantly, Cole describes countermeasures to use to defend against the various types of attacks and exploits he describes. Overall, an excellent reference for anyone needing to understand how hacking works and how to defend against them.

Good Security Reference

I found this book to be an excellent instructional tool and reference. Each topic seems to start out at the basics but quickly gets into specifics and details. For example, in the case of the NT passwords chapter. I knew a lot of the introductory material already, but found that the author went into such detail that I learned a lot.I choose IT books based on their 'everyday' use and what kind of shelf life they will have. I think this is an excellent book for both. There is a lot of practical information on security tools and techniques that will keep me busy for months. Additionally, the security principles are backed by specific examples. While the examples might age off as new operating systems become popular, the security descriptions will be valid as long as the Internet is around.

A truly comprehensive text on hacking techniques and defense

Let me first begin by stating that if you ever get the opportunity to take one of Eric Cole's classes, you are in for a real treat. He is an instructor for SANS, and I was fortunate enough to take his Incident Handling and Hacker Exploits class. His course material and teaching style is great, and if ever you are able to take a class of his by all means do so.Now on to his book. Eric does an excellent job of not only demonstrating the newest hacking exploits, he does even a better job of demonstrating the methodology of the hacker mindset. In addition, his text explains how to defend yourself against these exploits. This is an excellent resource for computer and network security, not only because of the many illustrated hacking techniques, but more so because after reading you will be able to think like a hacker. Both his class and his book demonstrate that Eric is very knowledgeable in hacking and defense. The best aspect of the book in my opinion is the fact that when he covers an exploit, he covers it in full-disclosed detail. The chapter on the SANS Top 10 Exploits is excellent, as it describes what exploits must be fixed for any organization that is connected to the Internet. All in all this is one of the best hacking books I’ve ever read.This is an excellent book for any potential reader who is looking for a text which gives an overall viewpoint of hacking, hacking techniques, and defending against hacks.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured