The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.
As a network administrator for an Internet Service Provider, I've witnessed numerous types of assaults on our clients as well as our own backbone. Hack Attacks Revealed not only clarified the modus operandi of these attacks but also helped me put a ?honeypot? game plan in place to investigate them. I?m enormously grateful for the technology primers, especially the header details and sniffer snapshots. These were significant in my pinpointing the most critical attacks in the debug data. Priceless.
Hack Attacks Revealed
Published by Thriftbooks.com User , 23 years ago
With this book I was able to thoroughly examine my network for unwanted open ports and potential security vulnerabilities. When a new vulnerability was discovered, I used Hack Attacks Denied to test and close the hole. Also I'm way too busy to check BugTraq or read my vendor's security advisories regularly. My solution: I went to join the companion website to get daily updates of new advisories for my Win Lin/Unix stations. Very convenient. Thank you.
Best book out there on the topic
Published by Thriftbooks.com User , 23 years ago
... Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker thinks and how hacker gets into your network. I was truly amazed at the information and the way it is presented is where for both types of users, advanced and Novices.Doesn?t matter if you?re new to this area of the IT industry or a veteran. These two books are a must have resources. It doesn?t matter if you?re a small business or a large IT firm. Hackers are trying to get anyone and everyone. It is best to be prepared. There is a set of utilities that come with the book, which is great. The book has a lot of real life examples and plenty of resources on the CD...
A comprehensive guide to security and hacking
Published by Thriftbooks.com User , 23 years ago
Hack Attacks Revealed is a comprehensive guide to security, hacking, and the underground. This is an amazing book, not only for its content but also its accompanying CD-Rom. There's a real sense, throughout the book, of the author's personality and programming prowess. Some introductory books will only talk about computer ports and exploits, but the focus on this one is to show you by example, tackling advanced issues. It teaches you how to network, internetwork, hack, and to think like a hacker, to really understand the sensitivity of these gurus. The wealth of experience of the author is contained within these pages, and is an invaluable learning tool. I highly recommend this book; this comprehensive guide is an excellent value, and a long lasting reference when working in the field today.
Get a Copy of this Book
Published by Thriftbooks.com User , 23 years ago
In this day and age, attacks against companies' internal networks are always a threat and virtually any business, government, or educational institution needs to protect itself against this threat. Firewalls offer an excellent protection against such attacks-but it's just not enough.This new reference offers a lot of information even about veteran techniques. It describes different types of attacks, the tools (both software & hardware), and Internet services (World Wide Web, electronic mail and netnews, FTP, telnet, etc).There's a lot of good common-sense information in here too, when it talks about how you go about deciding what you should and shouldn't do. I learned quite a bit from this book and anyone who needs to learn about security, even if you have no experience, should get a copy of this book if they already haven't.Also recommended: Hack Attacks Denied, Hacking Exposed (2nd)
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.