Rating: Summary: The "Hacking Exposed" series scores a hat trick Review: I am a senior engineer for network security operations. I read "Hacking Exposed Windows 2000" ("HEW2K") to learn how adversaries compromise Windows hosts. Like the original "Hacking Exposed" (now in a third edition) and the newer "Hacking Linux Exposed," HEW2K delivers no-nonsense, high-impact security information. I give all three books my highest recommendation. Having read the original "Hacking Exposed" in Oct 99, I knew the authors possessed strong Windows security and administration skills. HEW2K gives the Foundstone crew a way to share their knowledge with the world. Thankfully, HEW2K doesn't repeat information found in the general-purpose "Hacking Exposed." For example, HEW2K covers Windows-specific denial of service issues, but directs readers to "Hacking Exposed, Third Edition" for a broader description of DoS. The same approach is taken with social engineering and dial-up security. The "Hacking Exposed" series differ from the "Maximum Security" and "Hack Proofing" titles. While the latter are predominantly defensive-minded, HEW2K and its cousins are more offensive in nature. Vulnerability assessors and penetration testers will appreciate this focus. I was able to immediately apply tools and techniques in HEW2K to discover at-risk hosts on client networks. HEW2K continues to offer the best combination of command-line examples, screen shots, and sample output of any security books I've read. I could literally read, type commands, and check results against the material in HEW2K. Furthermore, HEW2K covers topics given little attention elsewhere; these include attacking and defending SQL Server, Terminal Services, and client applications. HEW2K also gives enough background on each topic, like ISAPI filters or ASP, to give unfamiliar readers enough context to understand security implications of these technologies. HEW2K is another must-buy from Osborne McGraw-Hill. As Foundstone principles, the authors ride the cutting edge of security developments. They recognize and communicate that application security (IIS, SQL Server, etc.) is the target of choice as administrators lock down layer 4 and below. With its clear methodology, expert explanations, and inside tips, HEW2K easily differentiates itself from the pack. We readers benefit, and hopefully our adversaries will not. (Disclaimer: I received a free review copy from the publisher.)
Rating: Summary: Foundstone's best work yet Review: I've had the benefit of observing Foundstone from it's pre-origin as a group of Ernst & Young Consultants teaching "eXtreme Hacking" who ventured into their own firm. This is the culmination of that expertise, the book is as enlightening as it is a highly valuable reference. Every NT/Win32 Administrator should own this book.
Rating: Summary: One of the few GREAT Win2k Books of all time! Review: I've read a number of Win2k Security and hacking books, and up to this point have been uniformly unimpressed. Most of these books talk about the theory behind various security concepts, such as how Kerberos works, how IPSec works on the packet level, etc. While this is important information, it doesn't help the working network engineer and admin with the practical aspects of securing the enterprise network.Hacking Exposed Win2k breaks the mold for Windows Security books. Every few pages you'll find an Aha! experience. I'm happy with a book that provides one or two of these. This book has hundreds of them! You can use the information IMMEDIATELY. You don't have to translate "propeller head" language into action. They give you the actions in plain English. What's truly remarkable is that these guys *are* propeller heads, but can write so a normal person not only understands, but enjoys, what they have to say! A very rare talent. EVERYONE who runs a Win2k network needs this book. Get it and you'll not be disappointed. I'd give it 10 stars if I could.
Rating: Summary: Buy this book if you use windows Review: If you are responsible for a Windows 2000 server and do not have this book, you are asking for trouble. Get it today!!!!
Rating: Summary: The best security manual I have ever seen Review: If you are responsible for a Windows 2000 server and do not have this book, you are asking for trouble. Get it today!!!!
Rating: Summary: How to defend against the latest attacks Review: Joel Scambray and Stuart McClure co-authors of Hacking Exposed wrote Hacking Windows 2000 Exposed: Network Security Secrets & Solutions to explore the workings of Windows 2000 security attacks and countermeasures. They provide step-by-step information how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.
Rating: Summary: Excellent book - useful from the first read Review: My security officer loves this book because it allows him to send me emails guaranteed to keep me up at night. ;-)
Rating: Summary: One of these books that you just GOTTA have Review: Now here is one of these books that you just GOTTA have. If you only buy one or two books a year, this is one of them. Remember how enthused I was about the original "Hacking Exposed" in W2Knews? Well, they have done it again, but now with an all-Windows 2000 focus. This is the end-all of hacking into your W2K servers. A must-read if you want to secure your networks and a 'Stu's Warmly Recommended!' I'm holding a fresh copy just off the presses in my hot little hands. I know what I'm going to do this weekend! It's a treasure trove of information no W2K sysadmin should be without.
Rating: Summary: One of these books that you just GOTTA have Review: Now here is one of these books that you just GOTTA have. If you only buy one or two books a year, this is one of them. Remember how enthused I was about the original "Hacking Exposed" in W2Knews? Well, they have done it again, but now with an all-Windows 2000 focus. This is the end-all of hacking into your W2K servers. A must-read if you want to secure your networks and a 'Stu's Warmly Recommended!' I'm holding a fresh copy just off the presses in my hot little hands. I know what I'm going to do this weekend! It's a treasure trove of information no W2K sysadmin should be without.
Rating: Summary: Hacking Exposed Windows 2000 Review: One of the best books to understand cyber attacks. Special the SQL hacking is a must to read.
|