» » Hacking Exposed: Network Security Secrets Solutions, Second Edition (Hacking Exposed)
eBook Hacking Exposed: Network Security Secrets  Solutions, Second Edition (Hacking Exposed) ePub

eBook Hacking Exposed: Network Security Secrets Solutions, Second Edition (Hacking Exposed) ePub

by Joel Scambray,Stuart McClure,George Kurtz

  • ISBN: 0072127481
  • Category: Networking and Cloud Computing
  • Subcategory: Computers
  • Author: Joel Scambray,Stuart McClure,George Kurtz
  • Language: English
  • Publisher: McGraw-Hill/OsborneMedia; 2 edition (October 11, 2000)
  • Pages: 703
  • ePub book: 1529 kb
  • Fb2 book: 1746 kb
  • Other: lit lrf lrf txt
  • Rating: 4.6
  • Votes: 556


Hacking Exposed, the seminal book on white-hat hacking and countermeasures. Hacking Exposed (ww. ackingexposed.

Hacking Exposed, the seminal book on white-hat hacking and countermeasures. Bill Machrone, VP, Technology for ZiffDavis Media) (PC Magazine 2001-06-26). If you are a computer professional with an eye to the publishing world, you’re probably familiar with a big red book called Hacking Exposed. This bold book with its bold title often appears at the end of the aisle or in other easy-to-reach locations. The reason for all the attention - and.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology . I recall the first time I read a Hacking Exposed book. Learned some new things.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information.

Hacking Exposed 6 gives you the tools you need to prevent being a victim. -Bill Loesch, CTO, Guard ID Systems. Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team.

Stuart Mcclure, Joel Scambray, George Kurtz. Place of Publication.

item 2 Hacking exposed 6: network security secrets & solutions by Stuart Mcclure -Hacking exposed 6: network security secrets & solutions by Stuart Mcclure. Hacking Exposed: Network Security Secrets and Solutions by Joel Scambray, Stuart McClure, George Kurtz (Paperback, 2009). Stuart Mcclure, Joel Scambray, George Kurtz.

by Stuart McClure & Joel Scambray & George Kurtz. founder of the Hacking Exposed™ series of books and has been  . Hacking Exposed Web . The greatest of richness is the richness of the soul. ― Prophet Muhammad (Peace be upon him). 24 MB·15,177 Downloads. 05 MB·14,964 Downloads.

Hacking Exposed book. Start by marking Hacking Exposed: Network Security Secrets & Solutions as Want to Read: Want to Read savin. ant to Read. Maybe a bit outdated but this is a must read for everyone interested in the topic.

Joel Scambray has co-authored Hacking Exposed: Network Security Secrets & Solutions since helping create the book in 1999. He is also lead author of the Hacking Exposed Windows and Hacking Exposed Web Applications series (both from McGraw-Hill Professional). Scambray brings tremendous experience in technology development, IT operations security, and consulting to clients ranging from small startups to the world’s largest enterprises.

The seminal book on white-hat hacking and countermeasures. Should be required reading for anyone with a server or a network to secure. Bill Machrone, PC Magazine"The definitive compendium of intruder practices and tools. Steve Steinke, Network Magazine"For almost any computer book, you can find a clone  . Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities.

High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies


tamada tamada
With all the literature on network security, I really found this book a refreshing change of pace. Security experts will tell you that it is not enough to just know how to update patches and turn off unnecessary services. One must understand the mindset of a hacker, know the tools they like to use, and how they see your network from their perspective.
I really liked the approach of this book. It obscures nothing, and gives the would-be security person an in-depth view of how one can penetrate a system given time and a little know-how. The blunt honesty of this book can be surprising, as it gives default passwords for routers and switches among other things, but its this sort of wake-up call that turns network admins into security -conscious ones. I am definitely this book is in print.
I did have to give 4 starts to the book because it covers so many topics that it cannot devote as much as I would like on any one. Sections on Unix and Windows hacking are better left in the other books in the "Hacking Exposed" series. However, the information contained in those sections is no less useful.
All in all, this is a very worthwhile investment for admins and security guys who want to see things from the other side of the firewall, so to speak. :)
Vut Vut
I've read about 4 security books and this book was far better than the rest. Instead of simply telling you not to run a certain service cuz it might have a hole, it actually tells you what the hole is, how to exploit it, and where to get the tools you need to exploit it. This isn't a list of programs and their holes though, it starts at the begining teaching you how to enumarate (get info) from a computer from all kinds of different methods, such as trying to find out OSs, their versions, services that are running and who is currently on the system. It talks about scanning groups of computers to find the few that are exploitable. It then goes on to explain specific Windows9X holes, then NT, to Novell, and then to Unix. Spending upto 60 pages on each operating system (very in depth and all of it usefull). There are also chapters just on dialup and VPNs (virtual private networks), firewalls, network hardware (routers) and an entire chapter just about DoS's (Denial of Services). It then goes into Advance Techniques, problems with PHP and ASP, and then onto a chapter on Windows2000 (talk about being up to date). As far as my book collection goes, this definetly gets my Top5 rating of the 100+ books I've read. Theres alot of meat to eat in this book.
Umdwyn Umdwyn
The book is a good read and has many interesting examples of hacker attacks and tools. I'm an MCSE and a webserver administrator so I felt compelled to try all these hacking techniques on my servers and colleagues servers. The actual hacking techniques are over simplified and generally do not offer a casual hacker (non leet hacker) any opportunity to compromise you system. Only a way to impress their friends by saying - look I can tell what ports are open on this machine or look I can tell what operating system they are running etc. The explainations of defenses from these hacker probes and attacks I thought were very useful. The defenses are clear and relatively easy to implement. If you are paranoid - or take substantial pride in keeping hackers out of your system - definitley read this book. If you are generally interested in network WAN security, read this book.
The Rollers of Vildar The Rollers of Vildar
I bought this third edition, mostly because of the claims about covering wireless security area. Well, as it turned out, this 'coverage' includes just three lousy pages !!
The book is very like the second edition. No relevant changes are presented, and therefore several issues are now dated.
If you don't already own the second edition, then buy this new third edition, overall, it is a quite comprehensive and useful book. However, if you are looking for a serious wireless security treatment, then you should better try books like ' Hack Proofing Your Wireless Network' or alike.
Tojahn Tojahn
Don't let the size of this book fool you. This was one of the most exciting ( and scary ) books that I've read in a long time. I'm the owner of one of the largest used book webstores in the nation and it opened my eyes to the hacker's toolkit and how to stop them. Written from the hacker's perspective, it delves into how they can break into a site. Truly, if you are concerned about your own web site and/or your firewall security in a home or business, this book is worth it's weight in gold. I tightened down my firewall greatly after reading this book.
Inabel Inabel
Good info.
Hamrl Hamrl
I purchased this book to educate myself on threats to networks. Although I have a strong computing background (degree in computational chemistry, 20+ years application programming), my network weakness made this book virtually incomprehensible.
It is laid out much like a dictionary where an attack is listed along with its popularity, simplicity, impact and risk rating. What usually follows is a very technical discussion of the attack and possible counter measures.
I suspect that this book would be a great use to network and system administrators, but I also suspect few others will get much out of it.
I have long been a hacker of the benign sort, as well as a senior corporate systems manager. When Internet hacking/cracking started to become a serious concern, I decided I needed to educate myself on the subject rather than continue to rely on my staff and consultants.
This book did an excellent job getting me started. You have to come into it knowing what traceroute means, but given that, the book's "it takes a thief to catch a thief" approach does the trick.
I recommend that every CIO in the world read this book. Or else.