Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Security Warrior

Security Warrior

List Price: $44.95
Your Price: $29.67
Product Info Reviews

<< 1 2 3 >>

Rating: 4 stars
Summary: Great Book! Recommended for true security professionals
Review: This book rocks! If you are a neophyte to host/LAN/internet security, I suggest starting out with Hacking Exposed. But if you are ready for something more, this is it. I especially liked the step-by-step on how to compromise a WEP-secured wireless network.

I would have rated this 4.5 stars, but half stars were not offered. My one minor complaint is the weak discussion of hacking PKI on pp. 359-360. I suspect this is most likely due to the fact that the DoD, Microsoft and anal-retentive small companies like mine have bothered to deploy PKI. Little if any exploits are known at this point.

I suspect by the second edition of this book the authors will have many more PKI exploits to discuss.

Rating: 4 stars
Summary: Great Book! Recommended for true security professionals
Review: This book rocks! If you are a neophyte to host/LAN/internet security, I suggest starting out with Hacking Exposed. But if you are ready for something more, this is it. I especially liked the step-by-step on how to compromise a WEP-secured wireless network.

I would have rated this 4.5 stars, but half stars were not offered. My one minor complaint is the weak discussion of hacking PKI on pp. 359-360. I suspect this is most likely due to the fact that the DoD, Microsoft and anal-retentive small companies like mine have bothered to deploy PKI. Little if any exploits are known at this point.

I suspect by the second edition of this book the authors will have many more PKI exploits to discuss.

Rating: 4 stars
Summary: Great book, but not for a novice
Review: This excellent, well-written book can be an enugma at times. The authors indicate that the material is for someone who has read on the subject before, although there is quite a bit of material geared more towards novices like myself. In other places I was defintely out of my depth, not having enough of a C/*Nix background to fully comprehend the material. The authors cover reverse engineering, network attacks, platform attacks, and defense/intrusion detection methods.

I very much liked the samples and references to existing tools, although they clearly indicate the possible criminal repercussions of using some of these tools/techniques. The samples provide invaluable insight and experience into learning the techniques, and how to thwart them, if it's possible at this time. The intrusion detection/defense material is split between information that would benefit everyone, including home pc users, and techniques more suited to professionals, such as advanced intrusion detection and network defense. This would be a very good second book on the subject, and barring any sudden changes in the security landscape, this book should hold it's value for some time to come.

Rating: 4 stars
Summary: Security Warrior: A must.
Review: This has to be one of the best books I've read in quite some time. Security Warrior was easy to read and an attractive feature is the ability to skip between chapters without any problems. References to subjects covered in previous or in preceding chapters are noted. This book not only contains methods used by hackers but also details on how to protect yourself against attacks. It also includes programs (Bastille, IPtables, etc) with overviews of the important aspects. Anothere feature to note are the reference listings at the end of each chapter which include links to various useful sources.

This book is a must get for those who wish to get an idea of what can be done to secure systems as well as showing you things that might be overviewed initially.

Rating: 5 stars
Summary: Very good, very technical
Review: This is a very, very good book by two excellent authors.

But if it also very technical. If you are not a deep expert, you may not get 75% of the book. But even so, the other 25% are surely worth it.



<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates