Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: Great Book! Recommended for true security professionals Review: This book rocks! If you are a neophyte to host/LAN/internet security, I suggest starting out with Hacking Exposed. But if you are ready for something more, this is it. I especially liked the step-by-step on how to compromise a WEP-secured wireless network.I would have rated this 4.5 stars, but half stars were not offered. My one minor complaint is the weak discussion of hacking PKI on pp. 359-360. I suspect this is most likely due to the fact that the DoD, Microsoft and anal-retentive small companies like mine have bothered to deploy PKI. Little if any exploits are known at this point. I suspect by the second edition of this book the authors will have many more PKI exploits to discuss.
Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: Great Book! Recommended for true security professionals Review: This book rocks! If you are a neophyte to host/LAN/internet security, I suggest starting out with Hacking Exposed. But if you are ready for something more, this is it. I especially liked the step-by-step on how to compromise a WEP-secured wireless network. I would have rated this 4.5 stars, but half stars were not offered. My one minor complaint is the weak discussion of hacking PKI on pp. 359-360. I suspect this is most likely due to the fact that the DoD, Microsoft and anal-retentive small companies like mine have bothered to deploy PKI. Little if any exploits are known at this point. I suspect by the second edition of this book the authors will have many more PKI exploits to discuss.
Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: Great book, but not for a novice Review: This excellent, well-written book can be an enugma at times. The authors indicate that the material is for someone who has read on the subject before, although there is quite a bit of material geared more towards novices like myself. In other places I was defintely out of my depth, not having enough of a C/*Nix background to fully comprehend the material. The authors cover reverse engineering, network attacks, platform attacks, and defense/intrusion detection methods. I very much liked the samples and references to existing tools, although they clearly indicate the possible criminal repercussions of using some of these tools/techniques. The samples provide invaluable insight and experience into learning the techniques, and how to thwart them, if it's possible at this time. The intrusion detection/defense material is split between information that would benefit everyone, including home pc users, and techniques more suited to professionals, such as advanced intrusion detection and network defense. This would be a very good second book on the subject, and barring any sudden changes in the security landscape, this book should hold it's value for some time to come.
Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: Security Warrior: A must. Review: This has to be one of the best books I've read in quite some time. Security Warrior was easy to read and an attractive feature is the ability to skip between chapters without any problems. References to subjects covered in previous or in preceding chapters are noted. This book not only contains methods used by hackers but also details on how to protect yourself against attacks. It also includes programs (Bastille, IPtables, etc) with overviews of the important aspects. Anothere feature to note are the reference listings at the end of each chapter which include links to various useful sources. This book is a must get for those who wish to get an idea of what can be done to secure systems as well as showing you things that might be overviewed initially.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Very good, very technical Review: This is a very, very good book by two excellent authors.
But if it also very technical. If you are not a deep expert, you may not get 75% of the book. But even so, the other 25% are surely worth it.
|