Skip to content
Paperback Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions Book

ISBN: 0071613749

ISBN13: 9780071613743

Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$6.79
Save $43.20!
List Price $49.99
Almost Gone, Only 5 Left!

Book Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest... This description may be from another edition of this product.

Customer Reviews

5 ratings

This is the book to use for penetration testing and analysis

Hardly a week goes by that CNN does not report a high-profile Web site being defiled or an e-commerce site being penetrated. While most people know why these incidents occurred, Hacking Exposed explains how they occurred and, more important, how to prevent them from occurring. The cover of Hacking Exposed announces that "Network security is Y2K without the deadline." That alarmist statement, however, is the only hype in the book. The work is packed with real-world examples and links to tools needed to assess the security of any type of client/server and Web system. As they detail the myriad vulnerabilities in different types of systems, the authors provide countermeasures for each of them. Well organized, the book progresses in an orderly fashion. It methodically goes through the process of exploiting a target to penetrate a system--from identification and enumeration to actual penetration. The authors provide detailed instructions and explanations for many security features and flaws in Unix, Linux, Windows, NetWare, routers, firewalls, and more. Topics covered include state-of-the-art computer and network penetration, as viewed by both the attacker and the defender; remote system identification; vulnerability identification; war dialers; firewall circumvention; and denial-of-service attacks. An appendix explores the security characteristics of Windows 2000. Some may argue that books such as this one only serve to motivate and educate hackers. The truth is that hackers are already aware of the book's contents. This book is designed for system administrators and managers who need to know their systems' risks and vulnerabilities and how to address them. When they are done with this book, system administrators and managers will be familiar with such critical topics as back channels, port redirection, banner grabbing, and buffer overflows. Hacking Exposed is a must-read for anyone who wants to know what is really happening on their network....

Everyone who owns a computer should have this book

This is an excellent book on computer and network security. I thought I new a lot about the subject, but after reading this book from cover to cover I know how much work I need to do to secure my networks. The book is packed with real-world scenarios and up to date information and tools (or links to tools) needed to hack into virtually any type of system. Fortunately, the authors wisely chose to provide countermeasures for each hack listed, which is invaluable to anyone who's livelihood involves maintaining networks. The organization of the book is excellent - it takes you through the steps needed to hack a system, from identification and enumeration to actual penetration, but also allows the advanced reader to quickly find system specific information or methods. Several appendixes are loaded with links to security sites and tools, legal information, and even common port lists. A must read for anyone who owns a computer; you will realize how vulnerable you really are.

It Hacks it

Hacking exposed is one of the best books that I have come across. It is good for network administrators and new hackers alike. Hacking exposed takes you from the beginning to the end of a hack. It shows you how to catch the hacker, and it shows the hacker how not to get caught. I highly recommend this book if you have a network or are interested in network security.

Excellent place to start

I have long been a hacker of the benign sort, as well as a senior corporate systems manager. When Internet hacking/cracking started to become a serious concern, I decided I needed to educate myself on the subject rather than continue to rely on my staff and consultants.This book did an excellent job getting me started. You have to come into it knowing what traceroute means, but given that, the book's "it takes a thief to catch a thief" approach does the trick.I recommend that every CIO in the world read this book. Or else.

A good book

The authors did their homework on this one. Anyone who spends time at the Cons will recognize many of the names that helped with the information put forth in this book. For those of you who know Hobbit, Mudge, Simple Nomad,AlephOne and many others know the incredible level of expertise they offer. These are the guys that make the things that break the things we make.This book was a good read. I bought it last week and I'm going through it a second time this week. If you are serious about learning security this book is a must have. It was well done and has good solid information. After reading it you realize just how screwed your network can be - and how easy it is with the readily available tools on the net. Good job guys, it's another keeper.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured