Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
White-Hat Security Arsenal: Tackling the Threats

White-Hat Security Arsenal: Tackling the Threats

List Price: $44.99
Your Price: $32.58
Product Info Reviews

<< 1 2 >>

Rating: 1 stars
Summary: Practical introduction that doesn't deserve to succeed
Review: Thanks to san_kalyan for a very honest review.
This is the worst book ever published on computers security. Even worse is to compare it with Spafford and Garfinkel's `Practical Unix and Internet Security', a true classic.
White-Hat Security Arsenal:... is a trivial and outdated book. Bad structured and totally useless even for beginners.
Don't throw your money away. Buy books like 'Hacking Exposed' if you are interested in the basics of computer security.

Rating: 5 stars
Summary: The security book I've been looking for
Review: This book explained to me how to solve the problems that I deal with all the time in my job. I like the fact that someone took the time to think about the reader and not to focus so much on all of the esoteric aspects of security that you find in most books. I already loaned my copy out to a colleague, and I'm recommending this book for everyone.

Rating: 5 stars
Summary: Countering Interlopers
Review: This is not your standard how-to security book. This is a well-designed, well-written volume on what the threats are, how they work, and what there is on hand to resist those threats.

Viruses, worms, denial of service attacks are just the beginning of this. Rubin dissects the Morris Worm, Melissa, ILove You, and several other malicious invertebrates. His explanations of just how these infiltrative beasties work is just brilliant.

The sections on secure transfer, setting up session keys, SSL, and encrypted email are really fine.

This is a ``different'' security book: and it's one you need.

Rating: 1 stars
Summary: Save your money by not buying this junk!!!
Review: This is the one of the classic example, where you are not supposed buy into the reviews. I can't really believe how come this book got such a good rating. I found this book at our University's library, looked for the rating in Amazon and I was pretty impressed. Then I gone through this textbook for a few days. What all I can say after reading it is the material is completely outdated and redundant. [...] The information that you will find in this textbook can be found any where on the Net, believe me better than this information and much detailed. This is a book of research on vendors who make some stupid software. "An explanation of this phenomenon is outside the scope of this book" is the most commonly found sentence in this text book. Then why should people buy this textbook, where is this textbook good at??? [...]

Rating: 5 stars
Summary: Interesting problem-oriented approach and a great book
Review: When I first saw this cover, I thought it was silly. I still think that it is a silly cover, but it is a great book. The first thing I like about it is the idea of chapters covering specific problems. The PGP Disk section that explains how to store data on a computer was great, and I've started using that program. It's not just a product endorsement book, though. The explanations are very detailed, and simple enough to follow even though I do not have a security background. My degree is in general computer science. I've checked out other security books, but this is the one I like the most. The writing style is very entertaining. There is good information, and it is presented in an interesting way. That is rare. I wish that the book covered more problems. For example, there is only a brief section on denial of service, which is something many of my clients are asking about. Also, the virus section is very good, but it is dated. Obviously, it was written before Code Red. I'm not sure what the author could do about that, but maybe a companion web site would be good. I also thought that the chapter about backup systems might get dated quickly. There are companies presented, and many of them are probably already out of business. However, the author covers the philosophy behind these companies and why they are good or bad, so I guess it will not be dated that quickly. All in all, I think this is the best security book I have seen, and for someone who has actual security problems, or in my case, clients with real security problems, it is a great educational tool.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates