Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Web Hacking: Attacks and Defense

Web Hacking: Attacks and Defense

List Price: $49.99
Your Price: $34.99
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: If you are responsible for a web site, get this book
Review: This no-fluff book weighs in at just under 500 pages that are guaranteed to quell any feelings of complacency you may have about the safety of your website. One of the gnawing concerns I live with is that my website will be hacked. I can't say this book made me feel better about that fear, but it brought to light a number of things to talk to my people about. Using real-world examples, it explains the kinds of openings hackers look for, and the ways they exploit those openings to do their damage. In some senses, this book is not just a warning, it is also a how-to for Internet security.

The general premise of this book is that no one is safe from attack, and if you're not already a victim, that's only a matter your good luck so far. Read this book. Study it carefully. Keep it on the nearest, most convenient bookshelf. New kinds of attacks are being developed all the time. But this book will prepare you for what's out there so far, and give you some insight into the kinds of things to watch for in the future.

Rating: 5 stars
Summary: If you are responsible for a web site, get this book
Review: This no-fluff book weighs in at just under 500 pages that are guaranteed to quell any feelings of complacency you may have about the safety of your website. One of the gnawing concerns I live with is that my website will be hacked. I can't say this book made me feel better about that fear, but it brought to light a number of things to talk to my people about. Using real-world examples, it explains the kinds of openings hackers look for, and the ways they exploit those openings to do their damage. In some senses, this book is not just a warning, it is also a how-to for Internet security.

The general premise of this book is that no one is safe from attack, and if you're not already a victim, that's only a matter your good luck so far. Read this book. Study it carefully. Keep it on the nearest, most convenient bookshelf. New kinds of attacks are being developed all the time. But this book will prepare you for what's out there so far, and give you some insight into the kinds of things to watch for in the future.

Rating: 5 stars
Summary: Grab a cup of ¿joe¿ curl up in a comfy place and get ready f
Review: Web Hacking, Attacks and Defense by Stuart McClure, Saumil Shah and Shreeraj Shah is an excellent introductory level book to the world of web hacking. If you are a seasoned professional you will also enjoy having this book in your collection, as it is an excellent resource book.

Ever wonder how anyone can enter a web site and see more than what's presented? With a clear understanding of the protocols, web languages, an understanding of the processes behind e commerce and a bit of historical knowledge you too can hack a web site, and wind up on the FBI's most wanted list. But by the same token, a little bit of knowledge is a powerful thing, with the information presented here you can easily get started on the road to keeping the hackers out, and damage to a minimum if they do get in.

The chapters are clearly laid out, and include code with explanations of the weaknesses, referrals to more in depth study, precautionary measures you can take to help secure your site and a look at the various tools available to harden your site.

IIS and Apache are reviewed, along with Oracle and SQL Server to show some of the more popular Web Servers and Databases, how they work, are exploited and ways to harden them against attack. The protocols used by the web, web programming languages, and an explanation of how a browser interprets commands are graphically laid out with examples presented. It would be hard to come away from this book with out an understanding of the concepts, as they are so clearly defined.

Everything from setting a common understanding of terms to basic E Commerce concepts to unraveling Code Red and a truly unique presentation of IDS (Intrusion Detection Systems) is presented and well worth the time it takes to read.

Enjoy!

Rating: 4 stars
Summary: Excellent book on web security
Review: Web Hacking: Attacks and Defense is quite similar to 'Hacking Exposed Web Applications' by Joel Scambray & Mike Shema.

Both Hacking Exposed Web Applications and Web Hacking: Attacks and Defense will clearly open one's eyes to the risks of web hacking. Forgetting for a minute the myriad vulnerabilities that effect many software products (including Windows, Apache, ColdFusion, and more), both books show how poorly written software, and misconfigured web servers make the penetration of web servers child's play.

Both books provide step-by-step instructions in a easy to read style for hardening web servers against attack. For those that have read previous and are comfortable with books in the Hacking Exposed serious, Hacking Exposed Web Applications uses the same easy to read and well organized style. Web Hacking: Attacks and Defense has almost the same amount of content, but is written in a slightly more technical manner.

Both books clearly explain how hackers gather information, acquire targets, gain control, and afterwards cover their track. Anyone interested in ensuring their web servers are secured should definitely read these books.

Both books have a lot of value even for those who are not so security conscious. For those with an interest in security, one's eyes will be open to the myriad places where vulnerabilities lie, from software, to scripts, mark-up files, and more. Anyone concerned with web server security should definitely read these books, or at least ensure their system administrators do.

Rating: 4 stars
Summary: Excellent book on web security
Review: Web Hacking: Attacks and Defense is quite similar to 'Hacking Exposed Web Applications' by Joel Scambray & Mike Shema.

Both Hacking Exposed Web Applications and Web Hacking: Attacks and Defense will clearly open one's eyes to the risks of web hacking. Forgetting for a minute the myriad vulnerabilities that effect many software products (including Windows, Apache, ColdFusion, and more), both books show how poorly written software, and misconfigured web servers make the penetration of web servers child's play.

Both books provide step-by-step instructions in a easy to read style for hardening web servers against attack. For those that have read previous and are comfortable with books in the Hacking Exposed serious, Hacking Exposed Web Applications uses the same easy to read and well organized style. Web Hacking: Attacks and Defense has almost the same amount of content, but is written in a slightly more technical manner.

Both books clearly explain how hackers gather information, acquire targets, gain control, and afterwards cover their track. Anyone interested in ensuring their web servers are secured should definitely read these books.

Both books have a lot of value even for those who are not so security conscious. For those with an interest in security, one's eyes will be open to the myriad places where vulnerabilities lie, from software, to scripts, mark-up files, and more. Anyone concerned with web server security should definitely read these books, or at least ensure their system administrators do.

Rating: 4 stars
Summary: Good Overview Of Attacks & Defense
Review: Web Hacking: Attacks and Defense is quite similar to `Hacking Exposed Web Applications' by Joel Scambray & Mike Shema.

Both Hacking Exposed Web Applications and Web Hacking: Attacks and Defense will clearly open one's eyes to the risks of web hacking. Forgetting for a minute the myriad vulnerabilities that effect many software products (including Windows, Apache, ColdFusion, and more), both books show how poorly written software, and misconfigured web servers make the penetration of web servers child's play.

Both books provide step-by-step instructions in a easy to read style for hardening web servers against attack. For those that have read previous and are comfortable with books in the Hacking Exposed serious, Hacking Exposed Web Applications uses the same easy to read and well organized style. Web Hacking: Attacks and Defense has almost the same amount of content, but is written in a slightly more technical manner.

Both books clearly explain how hackers gather information, acquire targets, gain control, and afterwards cover their track. Anyone interested in ensuring their web servers are secured should definitely read these books.

Both books have a lot of value even for those who are not so security conscious. For those with an interest in security, one's eyes will be open to the myriad places where vulnerabilities lie, from software, to scripts, mark-up files, and more. Anyone concerned with web server security should definitely read these books, or at least ensure their system administrators do.

Rating: 4 stars
Summary: Entertaining and educational
Review: Web services infrastructure for electronic commerce. So hard to built,
even harder to secure. With this great book, it is sooo easy to
subvert, destroy, corrupt and otherwise blast it to really small
pieces. Rival the glory of Mr Lamo with just the book and the web
browser!

Humor aside, the new book is a valuable resource for security
professionals. As other awesome books written by the Foundstone folks,
it provides the wealth of often exclusive information on the new and
dangerous security domain - web application and services hacking.

Amazingly, I believe the book will also help web developers to
understand the implication of their actions and design decisions. It
is indeed hard to write a book that appeals to both "in-the-know"
crowd and more general populace, but Stuart McClure team managed to
succeed at that.

An important advantage of this book is the detailed review of modern
web technologies. From HTML and XML feature summary to web application

architectures the book covers many web commerce and web services
components on front end, back end and middle tier. Moreover, security
implication are emphasized for every outlined feature and technology.

Starting from Java and HTML primers, the book unfolds its exciting
story all the way to SQL injection and IDS evasion via Unicode and
SSL. The detailed coverage of web reconnaissance techniques such as
URL and page headers fingerprinting and site linkage analysis is
provided. Another cool information gathering techniques is eliciting
error messages from back end web application for their identification
and penetration. Truncated URLs, invalid resource requests and
parameter tampering are have a chance to produce an elusive and
informational message from the applications and databases.

Case studies, while reminiscent of bad comic books (such as the one
about an bad Russian hacker, Boris), do serve to illustrate the web
hacking concepts and are quite informational.

Web defacers and ID thieves will also pick up a lesson or two from the
authors. Several techniques for subverting web application into
uploading your own content and stealing access credentials (such as
cookies) are covered in the book, often with the excruciating level of
detail.

Every self-respecting web hacker should be able to keep up with their
adversaries by reading their email. Several tricks for hacking web
mail systems are also shared by the authors.

Overall, my impression is that the book is not as brilliantly written
as previous Foundstone titles. However, this is understandable since
it is very hard to beat such masterpieces as "Incident Response" and
"Hacking Exposed". It is a definite "must get!" While providing many
defense methods and "best practice" designs, the book is stronger on
the attack side.

Anton Chuvakin, Ph.D., GCIA is a Senior
Security Analyst with a major information security company. His areas
of infosec expertise include intrusion detection, UNIX security,
honeypots, etc. In his spare time he maintains his security portal



<< 1 2 >>

© 2004, ReviewFocus or its affiliates