Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Hacking Exposed (TM) Web Applications

Hacking Exposed (TM) Web Applications

List Price: $49.99
Your Price: $32.99
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: The book to buy if you have a web server on the Internet
Review: "Hacking Exposed: Web Applications" (HE:WA) is an example of the direction the "Hacking Exposed" series should continue to take. The authors follow the methodology proven to compromise the mightiest servers. HE:WA is practioner-focused, giving readers the opportunity to follow along as the authors dissect victim web platforms. I highly recommend this book for its technical strengths and its ability to convey important information in an entertaining manner.

HE:WA is particularly strong where the authors choose to explain web technologies. Successfully compromising web platforms requires an understanding of more than Apache or IIS. Accordingly, HE:WA gives background on SQL, web services, and web-based management. My favorite aspect of the book is its ability to explain technical details of web-based systems with an eye towards security. It's refreshing to be introduced to web services, for example, as well as learn how to attack and defend them -- all in a single book!

HE:WA describes numerous vulnerabilities, chosen to demonstrate classes of attacks. The authors provide useful methodologies for assessing web applications, each with accompanying code and text snippets. Their explanations of cross-site scripting were exceptionally clear, thanks to this approach.

I found HE:WA to be a fast but informative and engaging read. The appendices, featuring "best practices" for securing web platforms, an assessment "crib sheet", and instructions for proper deployment of URLScan, bring this excellent book to a close. Scambray and Shema won't leave you hanging -- they share their knowledge to help keep your systems as secure as possible. This is the book to buy if you're responsible for web server security.

Rating: 5 stars
Summary: The book to buy if you have a web server on the Internet
Review: "Hacking Exposed: Web Applications" (HE:WA) is an example of the direction the "Hacking Exposed" series should continue to take. The authors follow the methodology proven to compromise the mightiest servers. HE:WA is practioner-focused, giving readers the opportunity to follow along as the authors dissect victim web platforms. I highly recommend this book for its technical strengths and its ability to convey important information in an entertaining manner.

HE:WA is particularly strong where the authors choose to explain web technologies. Successfully compromising web platforms requires an understanding of more than Apache or IIS. Accordingly, HE:WA gives background on SQL, web services, and web-based management. My favorite aspect of the book is its ability to explain technical details of web-based systems with an eye towards security. It's refreshing to be introduced to web services, for example, as well as learn how to attack and defend them -- all in a single book!

HE:WA describes numerous vulnerabilities, chosen to demonstrate classes of attacks. The authors provide useful methodologies for assessing web applications, each with accompanying code and text snippets. Their explanations of cross-site scripting were exceptionally clear, thanks to this approach.

I found HE:WA to be a fast but informative and engaging read. The appendices, featuring "best practices" for securing web platforms, an assessment "crib sheet", and instructions for proper deployment of URLScan, bring this excellent book to a close. Scambray and Shema won't leave you hanging -- they share their knowledge to help keep your systems as secure as possible. This is the book to buy if you're responsible for web server security.

Rating: 5 stars
Summary: Excellent Addition to Hacking Exposed Series
Review: Companies go to great lengths to segregate their internal networks from the rest of the world. They implement firewalls and DMZ's to protect their computer systems from the malicious code flying about the public Internet. For the most part, companies can simply block incoming traffic from getting through to their network at all from the outside world. However, in order to host a web site the web server must be accessible from the public Internet. That means that the web server offers an inroad to the internal network if not configured properly.

Hacking Exposed- Web Applications: Web Application Security Secrets & Solutions by Joel Scambray and Mike Shema will show you what you need to know to protect your web servers. The authors explain how an attacker gathers information to identify target systems and seek out the vulnerabilities they can exploit to break in. They go into great detail to discuss the myriad of vulnerabilities on various platforms such as Apache, IIS, J2EE and more.

This book will help you understand just how much risk your web servers are exposed to- vulnerabilities within XML, cross-site scripting and other input validation attacks, SQL injection attacks and more. Thankfully, the authors go on to provide valuable information for how to guard against these attacks and ways to harden your web servers to protect them.

Anyone who administers a web server or develops web applications should read this book to understand the pitfalls and how to avoid them.

Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com).


Rating: 5 stars
Summary: The best web hacking book today
Review: I just finished reading Hacking Exposed Web Apps and was coming back to Amazon to fwd the recommendation to a friend who is a CSO at a Fortune 500 firm when I stumbled upon the review from hermie. I have to say that I disagree completely with hermie's assessment, and felt compelled enough to say so in print! First of all, the book does cover a number of web platforms besides IIS -- it's the only one I've seen that talks about web services in any detail (SOAP, UDDI, XML, etc.), and it also devotes entire chapters to both web app management and web client hacking as well (very salient but often overlooked topics in other books). Main author Scambray may be a Windows security expert, but the non-Windows expertise is very visible in the appendix on libwhisker and the chapters on surveying the app, attacking session state, and input validation, etc. This also calls into question the criticisms by hermie of the specific detail versus the depiction of broad concepts -- if you are after ancient security concepts, then you plainly shouldn't be reading the Hacking Exposed series! That's the point of each book in the series -- use fresh, relevant technical details on how to hack to illustrate cutting-edge *concepts* in computer and Internet security. I think hermie really missed the boat here. Finally, the straw that broke the camels back for me was the comparison to "Web Hacking" by McClure. McClure is an executive now running his own start-up, and the knock that I've heard on this book is that it is really non-technical and out-of-date in sections. McClure brought in strong contributors to drive the details, but apparently couldn't glue the right pieces together to make this book competitive. I have a borrowed copy on my shelf, but frankly could not get past the first three or so chapters. Sigh -- I guess that's the breaks when anyone can post their thoughts here in the review section :)

Rating: 3 stars
Summary: A decent introduction, but incomplete
Review: I must admit, I was disappointed with Hacking Exposed Web Applications (HE:WA, as another reviewer called it). Overall, I thought it was basically mediocre.

My main fault with the book was that it was incomplete; equal and fair coverage was not given where it should be. For example, Chapter 9 "Attacking Web Datastores" should have been called "Attacking Microsoft SQL Server." While some of the general techniques (i.e. SQL injection attacks) in Chapter 9 could have been applied to any SQL RDBMS, much of it was very specific to a Windows/IIS/ASP/MSSQL setup. This doesn't help me much to write my bread-and-butter Unix/Apache/Perl/PostgreSQL or even
Java/Oracle apps any better.

It seems like the authors wrote their book to be "Hacking IIS Web Applications Exposed" and at the last minute decided to throw in some Apache and Unix here and there, with a sprinkling of Cold Fusion and Netscape Enterprise, to market the book more broadly. If they had just stuck within their expertise (Joel Scambray wrote for Microsoft TechNet's ironically-titled "Ask Us About... Security" column and wrote "Hacking Windows 2000 Exposed") and produced their original book, I think they'd of come up with a better product.

Another problem I have with HE:WA (and the whole HE series) is that they spend too much time on specific attacks and not enough time on the broader security concepts. For example, how useful is the first HE book today? How useful with HE:WA be in three years? I still recommend "Computer Security Basics" to anybody beginning in the security arena, and that book was published over a dozen years ago. CSB remains in print today because it teaches sound pragmatic security <i>concepts</i> that remain relevant today.

I will say, however, that HE:WA does do a better job than some of the other HE books about reinforcing broad concepts (like Input Validation) across all platforms and languages. I still do not feel they teach pragmatic security for web app development though, and it's being pragmatic that will save you from tomorrow's attack. (You've got to distrust your OS, double-check whatever your webserver says, hate your database, and ALWAYS validate your input and you'll be immune to almost all vulnerabilities discussed in HE:WA ).

Despite all the problems I have mentioned, this remains an okay book for a novice web developer looking to learn security, especially those of the One-True-Microsoft-Way persuasion. If you're looking for an alternative, I'm half way through "Web Hacking: Attacks and Defense" (co-authored by Hacking Exposed lead author Stuart McClure) on Safari. I like it better than HE:WA so far, and it seems to be fairly comparable on the target audience and topics covered (and it actually covers them!) I would give it a 4/5 or a 5/5 based on what I've read.

In conclusion, if you can only by one book on Web Application security, don't get this one. Otherwise, it is at least worth a skim and a spot on the bookshelf.

Rating: 3 stars
Summary: A decent introduction, but incomplete
Review: I must admit, I was disappointed with Hacking Exposed Web Applications (HE:WA, as another reviewer called it). Overall, I thought it was basically mediocre.

My main fault with the book was that it was incomplete; equal and fair coverage was not given where it should be. For example, Chapter 9 "Attacking Web Datastores" should have been called "Attacking Microsoft SQL Server." While some of the general techniques (i.e. SQL injection attacks) in Chapter 9 could have been applied to any SQL RDBMS, much of it was very specific to a Windows/IIS/ASP/MSSQL setup. This doesn't help me much to write my bread-and-butter Unix/Apache/Perl/PostgreSQL or even
Java/Oracle apps any better.

It seems like the authors wrote their book to be "Hacking IIS Web Applications Exposed" and at the last minute decided to throw in some Apache and Unix here and there, with a sprinkling of Cold Fusion and Netscape Enterprise, to market the book more broadly. If they had just stuck within their expertise (Joel Scambray wrote for Microsoft TechNet's ironically-titled "Ask Us About... Security" column and wrote "Hacking Windows 2000 Exposed") and produced their original book, I think they'd of come up with a better product.

Another problem I have with HE:WA (and the whole HE series) is that they spend too much time on specific attacks and not enough time on the broader security concepts. For example, how useful is the first HE book today? How useful with HE:WA be in three years? I still recommend "Computer Security Basics" to anybody beginning in the security arena, and that book was published over a dozen years ago. CSB remains in print today because it teaches sound pragmatic security concepts that remain relevant today.

I will say, however, that HE:WA does do a better job than some of the other HE books about reinforcing broad concepts (like Input Validation) across all platforms and languages. I still do not feel they teach pragmatic security for web app development though, and it's being pragmatic that will save you from tomorrow's attack. (You've got to distrust your OS, double-check whatever your webserver says, hate your database, and ALWAYS validate your input and you'll be immune to almost all vulnerabilities discussed in HE:WA ).

Despite all the problems I have mentioned, this remains an okay book for a novice web developer looking to learn security, especially those of the One-True-Microsoft-Way persuasion. If you're looking for an alternative, I'm half way through "Web Hacking: Attacks and Defense" (co-authored by Hacking Exposed lead author Stuart McClure) on Safari. I like it better than HE:WA so far, and it seems to be fairly comparable on the target audience and topics covered (and it actually covers them!) I would give it a 4/5 or a 5/5 based on what I've read.

In conclusion, if you can only by one book on Web Application security, don't get this one. Otherwise, it is at least worth a skim and a spot on the bookshelf.

Rating: 5 stars
Summary: A must have for developers serious about security
Review: If you write web applications and are serious about their security, you need this book. The book gets you inside the mind of a hacker and shows you why simply having the latest patches and security updates is not enough.

Rating: 5 stars
Summary: A must have for developers serious about security
Review: If you write web applications and are serious about their security, you need this book. The book gets you inside the mind of a hacker and shows you why simply having the latest patches and security updates is not enough.

Rating: 5 stars
Summary: An Eye Opener
Review: It's no good burying your head in the sand and pretending your web applications are not vulnerable to attack... particularly not since the publication of this book! "Hacking Exposed: Web Applications" will appeal to both script kiddies and security administrators alike. Not only does it tell you about various security exploits, but also gives you practical advice on tools you should use and the techniques that will save you the most time without missing a potential backdoor.

When I first flicked through the book my initial reaction was that I wouldn't be able to find the information I wanted very quickly. Having read the book however, the structure of the book makes perfect sense as it follows the thought processes of someone trying to break into a web application. This train of thought makes you think about all the aspects and potential weaknesses of the application and so helps you to secure your web sites and servers more thoroughly than the "per server" approach I was expecting.

There is a lot of information to digest within these pages, so I highly recommend that you have a notepad and pen handy when reading this book for the first time. I make this recommendation because there are a lot of acronyms being thrown around (particularly in the earlier chapters) and it is very easy even for someone with adequate server knowledge to get dizzy from the use of terminology. The appendixes will prove useful references in their own right, with the checklist and crib sheet proving useful time and time again.

If you are serious about protecting your web applications, servers and internal networks, then you really should lock down all your connections with the internet. Reading "Hacking Exposed: Web Applications" will certainly get you looking at your site and it's security in a new way...

Rating: 5 stars
Summary: Unsettling but necessary
Review: Like powerful medicine, the "Hacking Exposed" series of books are unsettling and unnerving, but ultimately required reading for anyone serious about Internet security. The Web Application installment of the series covers exploits related to client- and server-side applications, as well as database and Web service compromises. For beginners, the book includes a section on server hacking, complete with explanations of the "script kiddie" tools that are nonetheless powerful and potentially damaging. And naturally, much emphasis is placed on security best practices and specific techniques for blocking potentially devastating exploits.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates