No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
The path to pro hackerdom is Hack Attacks Revealed, but be warned, the mark of a real hacker is serious technical expertise. Author, John Chirillo, starts with the internal details of IP, TCP, ethernet packets and the care and feeding of subnets even network sysadmins don't need to know but which anyone aiming to spoof a connection or fingerprint the hidden details of a network can't live without.
For the first third of Hack Attacks Revealed you might be forgiven for thinking you're training as a network design engineer. Even network cable types are covered. Then it gets complicated. Real hackers are real programmers. There's most of a C programming course built into the book, and you need it--and preferably Perl as well--to understand the wide range of included listings.
Much of the book is straightforward lists: port assignments, packet structures, handshaking protocols and other low level network engineering detail. Only by understanding can you hope to subvert systems--prevent others usurping them. To help there's a CD full of hacker utilities used to create and check for holes in your own security, though the demo TigerTools suite is too crippled to be useful. The lists of hardware (routers, switches), software and operating system vulnerabilities covered is awesome. The fact that fixes for most of them are available but often unimplemented is depressing.
You'll laugh, you'll cry but you'll keep reading. As a commentary on a clearly immature technology Hack Attacks Revealed is fascinating. As a wake-up call to sysadmins everywhere it should be compulsory reading. --Steve Patient
"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)
"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)
"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)
"Whoever "you" are--sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you'll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)
I really don't understand this book.
The author takes too much time to say too little discerning information. Read more
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss. Read morePublished on Oct. 13 2002 by Mario M. B. Neto
For network administrators and security managers who want to know the enemy, HACK ATTACKS REVEALED is essential reading. Don't leave your network without it.Published on Aug. 5 2002 by TB
If you are a security professional, then this book is not for you. Its content is too scattered.Published on July 30 2002 by Enjoy Life
Dated, boring, with a lot of repetitions, and full of almost useless information.
If you are really interested in 'Hack Attacks Revealed' then try the very recent 'Hack... Read more
This book is poorly written with alot of redundancy and useless information. I had to skim through alot of chaff to find any of the even remotely useful information contained... Read morePublished on Jan. 16 2002 by P. M. Franceus
Wow, what a dated conglomeration of material. I can't tell if it is meant for beginners or security experts. Read morePublished on Dec 19 2001
Anyone that is worried about securing there information, these books are a must have resource. These two books are essential information for knowing and understanding how a hacker... Read morePublished on Sept. 21 2001
An ambitious, comprehensive, and compelling investigation of the Underground. Truly a fascinating study of security evolution in action.Published on Sept. 20 2001