Skip to content
Paperback Hacking Exposed Windows 2000: Network Security Secrets and Solutions Book

ISBN: 0072192623

ISBN13: 9780072192629

Hacking Exposed Windows 2000: Network Security Secrets and Solutions

*In the tradition of the wildly successful Hacking Exposed - the 2nd edition of which sold over 75,000 units in just four months.*Unique approach to topic--no other book contains both hacking... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Acceptable

$6.09
Almost Gone, Only 1 Left!

Customer Reviews

5 ratings

Windows security demystified!

How do these hackers find my Windows network? What info can they get? How do they actually "connect" and compromise my system? Can I do anything about it? Will it be hard, expensive or will I have to hire somebody or maybe will just a firewall do? What is this netbios thing anyhow? If you have questions like this then this book is for you. Hacking Windows 2000 Exposed is not a book about building a bastion host, configuring a firewall, or encryption theory. It does however show in a very understandable way how "hackers" use common system utilities(netstat,net,nslookup,etc)and free tools(superscan,etc) to find weaknesses in a network or computer and exploit them for fun or profit. I think Microsoft has gotten a bad rap about producing insecure operating systems. Fact is that Windows 2000 can be VERY secure, but by default it is configured for ease of use and backwards compatability (that is changing in .NET Server). Equipped with the right knowledge such as this book, and being serious about taking the time and effort to do something, the vast majority of hack attacks will be stopped cold. 99.9% of hackers are unsophisticated and exploit common weaknesses and negligence. As the book explains weak passwords, no account lockout policy, lack of physical security, and using file and print sharing carelessly are still the biggest problems. However of course there are MANY other issues that need to be dealt with. Hacking Windows 2000 Exposed is very well organized. It takes you through the steps of how someone actually compomises a system and what you can do about it. It puts you in the mindset of a hacker and their methodology - finding a network, extracting information about it, attempting the connect/attack, gaining access, trying to get system or administrator access, reaking havok, and covering their tracks - maybe even leaving a backdoor for remote control! This approach to writing the book will leave you well prepared to defend yourself, audit activity, and show you how to test your own network for vulnerability. You will learn about netbios, network utilities, authentication protocols, ports, services, anonymous access, permissions, sniffers - how they can be used against you, what to do about it and a whole lot more. The first part of the book focuses on the Windows 2000 operating system. Later chapters focus on applications such as Internet Information Server, SQL, and Internet Explorer(including some great tips everyone can use) and tells you how to manage them for maximum security. The end of the book covers specific security features of Windows 2000 such as Ipsec, Efs, group policy, seurity templates, and how to use them. Appendix A is a concise summary on how to lock down your Windows 2000 computer - a recap of concepts covered throughout the book. Each chapter also has a very helpful summary at the end that reinforces what was covered(specifically the actions to take) in case you are overwhelmed by technical detail in the reading. I like

One of the few GREAT Win2k Books of all time!

I've read a number of Win2k Security and hacking books, and up to this point have been uniformly unimpressed. Most of these books talk about the theory behind various security concepts, such as how Kerberos works, how IPSec works on the packet level, etc. While this is important information, it doesn't help the working network engineer and admin with the practical aspects of securing the enterprise network.Hacking Exposed Win2k breaks the mold for Windows Security books. Every few pages you'll find an Aha! experience. I'm happy with a book that provides one or two of these. This book has hundreds of them! You can use the information IMMEDIATELY. You don't have to translate "propeller head" language into action. They give you the actions in plain English. What's truly remarkable is that these guys *are* propeller heads, but can write so a normal person not only understands, but enjoys, what they have to say! A very rare talent.EVERYONE who runs a Win2k network needs this book. Get it and you'll not be disappointed. I'd give it 10 stars if I could.

The "Hacking Exposed" series scores a hat trick

I am a senior engineer for network security operations. I read "Hacking Exposed Windows 2000" ("HEW2K") to learn how adversaries compromise Windows hosts. Like the original "Hacking Exposed" (now in a third edition) and the newer "Hacking Linux Exposed," HEW2K delivers no-nonsense, high-impact security information. I give all three books my highest recommendation. Having read the original "Hacking Exposed" in Oct 99, I knew the authors possessed strong Windows security and administration skills. HEW2K gives the Foundstone crew a way to share their knowledge with the world. Thankfully, HEW2K doesn't repeat information found in the general-purpose "Hacking Exposed." For example, HEW2K covers Windows-specific denial of service issues, but directs readers to "Hacking Exposed, Third Edition" for a broader description of DoS. The same approach is taken with social engineering and dial-up security. The "Hacking Exposed" series differ from the "Maximum Security" and "Hack Proofing" titles. While the latter are predominantly defensive-minded, HEW2K and its cousins are more offensive in nature. Vulnerability assessors and penetration testers will appreciate this focus. I was able to immediately apply tools and techniques in HEW2K to discover at-risk hosts on client networks. HEW2K continues to offer the best combination of command-line examples, screen shots, and sample output of any security books I've read. I could literally read, type commands, and check results against the material in HEW2K. Furthermore, HEW2K covers topics given little attention elsewhere; these include attacking and defending SQL Server, Terminal Services, and client applications. HEW2K also gives enough background on each topic, like ISAPI filters or ASP, to give unfamiliar readers enough context to understand security implications of these technologies. HEW2K is another must-buy from Osborne McGraw-Hill. As Foundstone principles, the authors ride the cutting edge of security developments. They recognize and communicate that application security (IIS, SQL Server, etc.) is the target of choice as administrators lock down layer 4 and below. With its clear methodology, expert explanations, and inside tips, HEW2K easily differentiates itself from the pack. We readers benefit, and hopefully our adversaries will not. (Disclaimer: I received a free review copy from the publisher.)

Excellent and timely

Extremely well organized and presented in an easy-to-grasp way, Hacking Windows 2000 Exposed will have the novice's jaws dropping, yet even the seasoned Win2K expert will raise an eyebrow (or both). The latest hacks and cracks are explained in detail, allowing the admin to really and truly see what they are up against and why security is so important to ANY computer attached to a network. I highly recommend that before you attach a Windows 2000 system to the Internet, read this book and test your system's security fully -- before an unwanted intruder does.

One of these books that you just GOTTA have

Now here is one of these books that you just GOTTA have. If you only buy one or two books a year, this is one of them. Remember how enthused I was about the original "Hacking Exposed" in W2Knews? Well, they have done it again, but now with an all-Windows 2000 focus. This is the end-all of hacking into your W2K servers. A must-read if you want to secure your networks and a 'Stu's Warmly Recommended!' I'm holding a fresh copy just off the presses in my hot little hands. I know what I'm going to do this weekend! It's a treasure trove of information no W2K sysadmin should be without.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured