- You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)
Botnets: The Killer Web Applications Paperback – Feb 1 2007
|New from||Used from|
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
About the Author
Craig A Schiller (CISSP-ISSMP, ISSAP) is the CISO for Portland State University and President of Hawkeye Security Training, LLC. He is the primary author of the first Generally Accepted System Security Principles. He is a co-author of “Combating Spyware in the Enterprise and “Winternals from Syngress, several editions of the Handbook of Information Security Management, and a contributing author to Data Security Management. Mr. Schiller has co-founded two ISSA chapters, the Central Plains chapter and the Texas Gulf Coast Chapter.
Jim Binkley is a teacher, network engineer, and researcher in the Computer Science Department at Portland State University. Jim has twenty five years of experience with UNIX operating system internals and twenty years of experience with TCP/IP networking. Jim teaches a graduate sequence of networking classes including TCP/IP, routing, and network security, and also teaches operating system classes including Linux O.S. internals, Linux Device Drivers, and BSD TCP/IP stack internals.
Most Helpful Customer Reviews on Amazon.com (beta)
Early in 2002, SDBot appeared. It was written by a Russian programmer
known as sd. SDBot is a major step up the evolutionary chain for bots. It was
written in C++. More important to the evolution of botnet technology, the
author released the source code, published a Web page, and provided e-mail
and ICQ contact information.This made it accessible to many hackers. It was
also easy to modify and maintain. As a result, many subsequent bot clients
include code or concepts from SDBot.
Then there are the pages of useless information. By useless, I mean quoting pages worth of collection files used by Cain. Or pages worth of court documents on a botnet-related settlement. No highlighting of the most relevant bits, or explanations as to how it pertains to the situation.
Oh, and the book also overtly references Wikipedia as it's prime resource of information for a section on botnet history. Not what Wikipedia may cite - but Wikipedia itself. This is not prime textbook material.
This would of course all be forgivable if the book had some good technical information. But it doesn't. Honestly folks, I thought I didn't know that much about botnets. But everything that's in this book, I already knew - with the exception of how to use Ourmon. This book feels more like a rehash of Symantec's information on popular botnet programs than it does a proper technical text.
The book also references papers that were published in January...2007. Given that the book is on the shelf already (barely a month later), one really has to wonder how much quality control Syngress Publishing puts into it's products. Yeesh.
Botnets suffers extensively from nonexistent editing. It's clear the authors wrote the text and figures, submitted them to Syngress, and finished their involvement in production. There was clearly no copy or proof editing in this process. Right from the start, Fig 1.1 on p 6 demonstrates the sort of presentation I would expect of a 6th grader. I thought Fig 1.2 on p 18 was an even bigger joke until I read "New Bot Rallys [sic] to let Botherder Know It's [sic] Joined The Team" in Fig 2.1 on p 36. The main text is often as lame as these diagrams, with questions like "How much is the Microsoft bounty for virus authors and how do I get me some?" When the book isn't frustrating readers with poor English, it's repeating sections like the Ancheta and Maxwell cases from Ch 1 reappearing in Ch 2, or yet another "bot overview" in Ch 4 repeating ideas from Ch 1. Are readers expected to pay for this sort of shoddy, unprofessional material?
On the positive side, I thought the chapters on Ourmon were decent. Since Botnets is the only book to cover this useful application, you might want to check them out. I thought Gadi Evron's section, probably written in late 2006 or early 2007, did a good job predicting what actually happened in botnet command and control (specifically with respect to FTP). The CWSandbox chapter was a real surprise, and I think it's the best part of the book. A different publisher might consider given Carsten Willems his own book deal.
Finally, no author should ever post a five star review of his own book on this Web site. I subtracted one star from this review after seeing the lead author give his own book a first review of five stars. That is really disappointing and completely unnecessary.
Look for similar items by category
- Books > Computers & Technology > Networking & Cloud Computing > Data in the Enterprise > Client-Server Systems
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption > Privacy & Online Safety
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems > Computer Science