AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis ISBN: 0-13-033273-9 Publisher: Prentice Hall PTR Pub. Date: 23 July, 2001 Format: Paperback Volumes: 1 List Price(USD): $49.99 |
Average Customer Rating: 4.86 (22 reviews)
Rating: 5
Summary: Learn hacking strategies and defenses and have fun reading!!
Comment: This is a "fun to read" book that fully describes the methodology of hacking attacks. It is by far the most enjoyable book I have read on the subject. The book is not a textbook or a reference book, yet I found that I learned a lot while I read it and I have continuously referenced it for specifics of the techniques that are described.
Ed starts by providing short intros to UNIX, NT and IP networking, which provide valuable info to readers who don't have good backgrounds in all three. He then walks the reader through the typical steps of an attack. Each of the sections, Reconnaissance, Scanning, Gaining and Maintaining Access and Covering Your Tracks contain well-written, up-to-the minute descriptions of the current methodologies found in the field as well as descriptions of the tools that are used.
He references the authors of the tools and points to their web-sites. There is great info on Sam Spade, THC-Scan, Cheops, nmap, nessus, IDS evasion techniques, buffer overflows, L0phtCrack, John the Ripper, Dsniff, Hunt, Netcat, TFN2K, BO2K, RootKit and others. Yet this isn't a set of man pages or an attempt to prove that he knows more tools than anyone else does. The usage of each tool is described in the context of the methodology that he is explaining.
My favorite chapter is "Putting it all Together: Anatomy of an Attack", where Ed describes three different "real-life" attack scenarios. In each scenario, fictional hackers use the tools and methodologies described in the earlier chapters to break the security of fictional target companies. This chapter really ties it all together!
Anybody who has heard Ed speak at numerous conferences will recognize his fun, fact-filled, informative style. This book is suitable for system administrators, technical experts, security practioners and business executives. I would recommend this book to everyone interested in the security of their systems and networks.
Rating: 5
Summary: One of the best books I've ever read on computer security...
Comment: This has got to be one of the best books that I've read on computer security, hands down. Ed obviously put a great deal of time and creativity into designing a book that would give a system/network administrator exactly what s/he needs to do useful computer security work: a solid understanding of the fundamentals. He follows that up with excellent descriptions and tutorials on the hacking process, including tools and techniques.
I loved Ed's introductory chapters, titled "Pretty Much Everything You Need to Know about {"TCP/IP","Windows NT/2000", "Unix"} to Follow the Rest of This Book, in N pages or Less." This was just an incredibly good idea. It provides a great introduction to what you need if you're new to this. It also provides great review on material that you might use every day but need to remember or understand more deeply. And, once you finish these, you're ready to learn about hacking/auditting tools and techniques.
Now, Ed takes a much *better* approach than most of the other books coming out today: for every tool, technique, or topic, he works to help you understand it very deeply. For example, most books include a short description of a tool, possibly accompanied by a table listing its command-line options. Ed takes the opposite approach -- he explains the tool's use and functionality in the right amount of detail and describes how the tool works, turning you into an instant power-user for every tool you use! I knew this book got it right when I saw 17 pages on Fyodor's nmap (the premier network mapping and scanning tool) -- to truly use nmap effectively, you've got to understand what it is that you're doing. The whole book shows this strong attention to exactly the right amount of focus on each topic and it shows.
This is one of the best designed well-written books on computer security that I've read in a while. If you don't buy anything else on network auditting or penetration testing, buy this book!
Rating: 5
Summary: Excellent Book, Easy to Read, Practical & Resourceful
Comment: Overall, highly recommended, it's a no doubt five stars quality book. Even though I borrowed this book from library, I just place an order to purchase my own copy. Excellent reference material!
This book covers two major parts: (1) All-you-need-to-know Overviews, and (2) Hacking Skills. Ed only takes about 20% of his entire book portion for giving readers the overview of all important knowledge such as Networking,Unix & Windows. For those overviews chapters, they are all well-written and extremely easy to follow even for complicated concepts. By themselves, they already worth the book value, and they're excellent for refreshing those key & important knowledge & concepts.
The second part of the book mainly addresses various hacking approaches. The contents are exactly same as Ed's desktop seminar 'The Hack Counter-Hack Training Course', which is a computer-based training video on CD-ROM. However, this book provides much more details and in-depth explanation on how-things-done. Again, it's really well-written to depict the complicated hacking techniques. If you purchase the Ed's The Hack Counter-Hack Training Course, I strongly recommend you to buy this book as your reference material. They should go in pair.
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments