AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Building Open Source Network Security Tools: Components and Techniques by Mike Schiffman, Mike Schiffman ISBN: 0-471-20544-3 Publisher: Wiley Pub. Date: 11 October, 2002 Format: Paperback Volumes: 1 List Price(USD): $45.00 |
Average Customer Rating: 4.29 (21 reviews)
Rating: 5
Summary: Refreshing Networking Security material!
Comment: There are many security books on the shelves today. Most of them describe the same hacker tools and methods. They don't get very technical and once you've read one, you've read them all. Building Open Source Network Security Tools is a different breed of security book.
Building Open Source Network Security Tools , just as the name suggests, is about how to build network security tools. This is a technical book, so you are going to have a little knowledge of C and your networking principles. This is definitely not a managers book.
First the book describes some basic principles in developing security software. This is a quick primer in case you have never been involved in software development. Next the book goes on to describe several commonly used libraries like libnet and libpcap. For each library, the structures and functions are explained, then there is sample code. I have written programs using libpcap and libnet before and I still learned something. There is even a section on OpenSSL programming. OpenSSL is a rather large and cryptic, no pun intended, library (in my experience anyways). This book sheds some light on it! These chapters are a great reference to have when making a new security tool.
The author then goes on to explain the several techniques like attack and penetration and active reconnaissance. Not only does the author tell you how they would in a technical sense, he provides code that does it, and explains each piece. This is very useful since most tools in the wild aren't very well commented ;) There is also a chapter on buffer overflows and format string vulnerabilities. These chapters are very well done and do a good job in explaining how they work and how to write code to use them. It may sound like this is an offensive hacker book, but it also gives examples on how to write defensive programs, like a port scan detection tool. At the end of the book the author ties it all together with a large program that utilizes many of the techniques mention in the book.
I found this book to be very refreshing. I had been waiting for a good security programming reference, and this is it. As a part of the Honeynet Project, I have seen a large number of compromises and tools, and one thing I've found is that in order to truly know who your enemy is, and how they operate, you need to know how their tools work. I wish this book had been released years ago when I first became interested in network security. It would have saved me from stumbling around old web pages and dead links. If you're an information security professional, this book is a must have for your library.
Rating: 5
Summary: amazing..must have for anybody who writes networking code
Comment: Even if your focus isn't security, any coder that writes networking code would find this book interesting and hard to put down. In addition to the security information, the book provides in-depth information on low level networking that any coder would find useful. The examples presented shows the reader how to, in a quick and concise way, build almost any network security tool they could imagine. This means that Security professionals no longer need to rely on companies like ISS for their tools. Chapter 10, Attack and Penetration Techniques, is worth the price of the book alone. Anybody that is responsible for securing a large network is familiar with vulnerability scanning, this chapter helps the reader understand how these tools work, and how to write there own. This type of information is extremely useful to people who find themselves in the position of quickly searching a network for something that other scanners may not detect yet. An example of this would be a new rootkit that listens on port 80. A simple port scan of a network would make finding compromised machines hard because 80 is also a legitimate port for web servers. Applying the information Schiffman gives you, a person could construct a scanner in almost no time. There are a dozen more examples why this book is elite, but rapid development and extensibility of tools that are developed throughout the book makes it a must have for any security professional.
Rating: 5
Summary: Excellent guide for the network administrator
Comment: This book was the perfect reference manual for the busy network administrator that needs to quickly create powerful tools to enforce and monitor network security. From concept to implementation Schiffman will give you a thorough understanding of why and how to create open-sourced security tools that you can start using immediately. Using this book as a reference I was able to create a customized network sniffer and a few vulnerability analysis tools. Another great addition to my library that I highly recommend.
![]() |
Title: The Shellcoder's Handbook : Discovering and Exploiting Security Holes by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell ISBN: 0764544683 Publisher: John Wiley & Sons Pub. Date: 22 March, 2004 List Price(USD): $50.00 |
![]() |
Title: Hacking: The Art of Exploitation by Jon Erickson ISBN: 1593270070 Publisher: No Starch Press Pub. Date: October, 2003 List Price(USD): $39.95 |
![]() |
Title: Exploiting Software: How to Break Code by Greg Hoglund, Gary McGraw ISBN: 0201786958 Publisher: Addison-Wesley Professional Pub. Date: 01 February, 2004 List Price(USD): $49.99 |
![]() |
Title: Security Warrior by Cyrus Peikari, Anton Chuvakin ISBN: 0596005458 Publisher: O'Reilly & Associates Pub. Date: 01 February, 2004 List Price(USD): $44.95 |
![]() |
Title: Hacker Disassembling Uncovered by Kris Kaspersky, Natalia Tarkova, Julie Laing ISBN: 1931769222 Publisher: A-List Publishing Pub. Date: 01 April, 2003 List Price(USD): $39.95 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments