Auto boutiques-francophones Simple and secure cloud storage Personal Care Cook All-New Kindle Paperwhite Explore the Amazon.ca Vinyl LP Records Store NFL Tools

Your rating(Clear)Rate this item


There was a problem filtering reviews right now. Please try again later.

Showing 1-4 of 4 reviews(3 star)show all reviews
on October 13, 2002
This is a strange book to review. I'd give a 50% recommendation mostly because some chapters (perhaps half the book) could have been stripped with no real loss.
There are some good ones, in the beginning and at the very end, but the ones in the middle simply reprint names and usage of trojan/worm/virus kit software found on the net. Besides not being a complete list is useless since needs to be updated in a daily bases.
The good chapters explain you a lot of the protocols and how they interact, common techniques used by intruders.
If you do not have any other security/tcp-ip related book you should buy this since it's a good start. If you already have others you can safely skip this one.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on September 5, 2001
This book is a good insight for those that need to gain an understanding of principles and methods at an easy to medium level. The hardened reader will have covered these topics in many other books. However, the perspective is now that of a hacker and not of the Net Admin. Lots of info covering the various approaches used by hackers, some of which my team were oblivious to! The Tiger Suite toolset is very useful in helping to show just how a network can be probed / penetrated via simple techniques.
The content is very easy to read and the information is collated in a logical manner. Worthwhile adding to a collection of other networking and security books, although not definitive.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on September 10, 2001
Hack Attacks revealed is a good starting point to understand the tools , methods and processes hackers use to attempt to penetrate networks. I would have liked to have seen more details on the descriptions of the attacks. I've just begun using TigerSuite to probe around on my network, but have to found of few of the tools to be quite useful already.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on September 7, 2001
This book is a good introduction to network security, even the more experienced should be able to pick up a trick or two. Worth the money!
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse