countdown boutiques-francophones Learn more scflyout Home All-New Kindle Music Deals Store sports Tools

Your rating(Clear)Rate this item

There was a problem filtering reviews right now. Please try again later.

Showing 1-4 of 4 reviews(3 star). Show all reviews
on October 13, 2002
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss.
There are some good ones, in the beginning and at the very end, but the ones in the middle simply reprint names and usage of trojan/worm/virus kit software found on the net. Besides not being a complete list is useless since needs to be updated in a daily bases.
The good chapters explain you a lot of the protocols and how they interact, common techniques used by intruders.
If you do not have any other security/tcp-ip related book you should buy this since it's a good start. If you already have others you can safely skip this one.
0Comment|Was this review helpful to you?YesNoReport abuse
on September 5, 2001
This book is a good insight for those that need to gain an understanding of principles and methods at an easy to medium level. The hardened reader will have covered these topics in many other books. However, the perspective is now that of a hacker and not of the Net Admin. Lots of info covering the various approaches used by hackers, some of which my team were oblivious to! The Tiger Suite toolset is very useful in helping to show just how a network can be probed / penetrated via simple techniques.
The content is very easy to read and the information is collated in a logical manner. Worthwhile adding to a collection of other networking and security books, although not definitive.
0Comment|Was this review helpful to you?YesNoReport abuse
on September 10, 2001
Hack Attacks revealed is a good starting point to understand the tools , methods and processes hackers use to attempt to penetrate networks. I would have liked to have seen more details on the descriptions of the attacks. I've just begun using TigerSuite to probe around on my network, but have to found of few of the tools to be quite useful already.
0Comment|Was this review helpful to you?YesNoReport abuse
on September 7, 2001
This book is a good introduction to network security, even the more experienced should be able to pick up a trick or two. Worth the money!
0Comment|Was this review helpful to you?YesNoReport abuse