AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks

Please fill out form in order to compare prices
Title: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
by Susan Young, Dave Aitel
ISBN: 0-8493-0888-7
Publisher: Auerbach Publications
Pub. Date: 24 November, 2003
Format: Hardcover
Volumes: 1
List Price(USD): $79.95
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.67 (3 reviews)

Customer Reviews

Rating: 5
Summary: Make sure you have a copy of this handbook close at hand!
Comment: ...This book covers a wide array of topics, focusing on three aspects of each topic: technical background, hacking, and security. The coverage is both comprehensive and practical. The book explains the technical and conceptual foundations of computer security. Its information is organized in a way that makes it easy to find material relevant to any questions you may have regarding hacking and security. And every chapter points to additional materials if you want to investigate further.

You'll learn all about the anatomy of various types of attacks, including the five elements of attack strategy: reconnaissance, mapping targets, system or network penetration, denial-of-service, and consolidation. You'll also learn about the tools you'll need to defend your network, how they all work within a security framework, and the strengths and weaknesses of each. Included are tools for the purposes of access control, authentication, auditing, privacy, intrusion detection, data integrity, and more.

If you are a network or security administrator, protecting your network's integrity is one of your most important tasks. Before you begin your chess match with the world's hackers, make sure you know the rules, the tools, and the possibilities of the game. Make sure you understand the strategies that will be used against you and that you can use against your opponents. Make sure you have a copy of The Hacker's Handbook close at hand. Hey, I do! - Raffiudeen Illahideen, IL, USA

Rating: 4
Summary: Good solid work
Comment: "The Hacker's Handbook" is a comprehensive and entertaining volume on security. It has most of the defining traits of a great book, such as clearly stated goal (authors realize that lots of security books are out there and one needs to differentiate) as well as some unique content on application attacks.

The book is a technically sound volume, I found very few factual mistakes. I found some interesting content on central auth servers such as radius, which I haven't seen described well elsewhere. Defensive tool info is a bit jumbled and not new. For example, IDS coverage is too non-specific to be useful. I also found a couple of other chapters a bit weak on interesting content.

The book covers the security field on many levels - from concepts to scripts - and can be successfully used by entry-level people as well as experts. The book is better suited for technologists rather than managers. Security analysts/admins, hands-on security managers, security savvy system and network admins, students of computer security can benefuit from a book.

Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org

Rating: 5
Summary: Great Book
Comment: I am a computer security consultant and I think this book is great. I found it complete and through. I would highly recommend it. It is like 800 plus pages. I wonder how many keyboards got worn out authoring this outstanding work.

Similar Books:

Title: Hacking: The Art of Exploitation
by Jon Erickson
ISBN: 1593270070
Publisher: No Starch Press
Pub. Date: October, 2003
List Price(USD): $39.95
Title: Exploiting Software: How to Break Code
by Greg Hoglund, Gary McGraw
ISBN: 0201786958
Publisher: Addison-Wesley Professional
Pub. Date: 01 February, 2004
List Price(USD): $49.99
Title: Security Warrior
by Cyrus Peikari, Anton Chuvakin
ISBN: 0596005458
Publisher: O'Reilly & Associates
Pub. Date: 01 February, 2004
List Price(USD): $44.95
Title: The Shellcoder's Handbook : Discovering and Exploiting Security Holes
by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
ISBN: 0764544683
Publisher: John Wiley & Sons
Pub. Date: 22 March, 2004
List Price(USD): $50.00
Title: Managing A Network Vulnerability Assessment
by Thomas Peltier, Justin Peltier, John A. Blackley
ISBN: 0849312701
Publisher: Auerbach Publications
Pub. Date: 28 May, 2003
List Price(USD): $59.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache