Top critical review
Not What I Expected
on August 17, 2001
This book had a few positive qualities, but I'm afraid it's weaknesses outweight its strengths.
If you are a script kiddie looking for a how-to reference of shrink-wrapped hacking tools, this may be the book for you. If you are a technical person looking for a book on hacking techniques or a network admin looking for ways to keep your network secure, I would pass on this one.
The explainations of topics in this book are vague and often misleading. The simple topics are explained ad-nauseum, and the difficult topics are breezed over, completely ignored, or inaccurately explained. The book consists mainly of screenshots, one-paragraph summaries of various hacking tools, and lots of useless tables. Explainations of exploits consist of "Tool X can exploit a security hole in the daemon listening on port Y" without explaining why the security hole is there, what the security hole is, or even how the exploit works....
Overall, If you want a good book on security, I suggest you take a look at "Applied Cryptography"....