For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.
Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.
You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient
I really don't understand this book.
The author takes too much time to say too little discerning information. Read more
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss. Read morePublished on Oct. 13 2002 by Mario M. B. Neto
For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.Published on Aug. 5 2002 by TB
If you are a security professional, then this book is not for you. Its content is too scattered.Published on July 30 2002 by Enjoy Life
Dated, boring, with a lot of repetitions, and full of almost useless information.
If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack... Read more
This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained... Read morePublished on Jan. 16 2002 by P. M. Franceus
Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. Read morePublished on Dec 19 2001
Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker... Read morePublished on Sept. 21 2001
An ambitious, comprehensive, and compelling investigation of the Underground. Truly a fascinating study of security evolution in action.Published on Sept. 20 2001