Hacking Exposed: Network Security Secrets and Solutions
Enlarge cover
Rate this book
Clear rating

Hacking Exposed: Network Security Secrets and Solutions

3.74 of 5 stars 3.74  ·  rating details  ·  422 ratings  ·  16 reviews
Hacking Exposed: Network Security Secrets and Solutions is written for network administrators who want to learn the tools and trade of computer hackers, so they can defend their businesses against the coming onslaught. Info World network security columnists Stuart McClure and Joel Scambray plan to leverage the current and future concerns over hacker tools and techniques to...more
Paperback, 700 pages
Published December 31st 1999 by Osborne Publishing (first published September 10th 1999)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.
This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 1,240)
filter  |  sort: default (?)  |  rating details
Roberto Travagliante
Complete guide concerning security. I think this is the bible of hacking!
Bill Leach
Case Study - An example of someone probing a system - use of the TOR network and an onion router for anonymity (torproject.org)

1 - Footprinting
- discovering the domain names, network blocks, subnets, routers and individual IP addresses on an entity
- publicly available information - company website, etc. - use phonenumber.com, yellowpages.com to look up physical addresses
- WHOIS and DNS enumeration
- DNS interrogation - using nslookup - determine mail exchange (MX) records using host commands
- net...more
Jiri
By the date it was released the best non fiction hacking books full of examples. A must read for those who are interested in basics.
Prattle On, Boyo
Not a hacking how to per se but more like a really good resource for securing your network. Some people object to titles like this one because they naively and mistakenly believe it helps the bad guys. But in reality, without knowing black hat techniques there is no possible way that you can secure your network. Period. The authors do an outstand job of walking the uninformed reader through the process of the hack from initial surveillance up to and including the attack. Highly recommend this bo...more
Alyssa
I had a friend who is an IT who recommended this book when I asked how he was able to track me down no matter where I got on the internet. This was a very well written book that was easy for me to understand. It made it a lot easier for me to understand how the internet works and how to properly secure my digital life. I would definitely recommend this book to more than just IT's and computer hacks.
Ryan
HE is required reading for anyone with a network to secure. Also some of the attacks are quite interesting from an engineering standpoint.

Only drawback is that it doesn't go far enough. I would prefer to see more packet level information. Don't tell me it's an arp spoof, show me.
William
Very good for beginners. I picked up a few things I didn't know, it also helped me with my sorely lacking Windows hacking skills. Wished I found this book earlier. But I guess I benefited more from learning the hard way in the end.
D
Good reference book to learn how to protect yourself. One thing I was hoping to get out of this book a how to do the hacks myself to myself own network and servers but that wasn't there. Safety precautions and legal liabilities I guess.
Kevin
As far as these types of books go this book offers I think the widest range of exploits, tools, and analysis for the money.
Jesse
Good read, lots of informative information on well... Hacking of course!
Takedown
Great overview book on information security in general.
Ann
Risk and vulnerability assessment for the network admin.
Vicki.has.answers
Neat computer tricks
Rolancross
i very like
Daniela
Daniela marked it as to-read
Jul 24, 2014
J C
J C marked it as to-read
Jul 24, 2014
Icqb
Icqb marked it as to-read
Jul 19, 2014
Prathibha
Prathibha marked it as to-read
Jul 19, 2014
« previous 1 3 4 5 6 7 8 9 41 42 next »
  • Reversing: Secrets of Reverse Engineering
  • Hacking: The Art of Exploitation
  • The Practice of System and Network Administration
  • Metasploit: The Penetration Tester's Guide
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Computer Organization & Design: The Hardware/Software Interface
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Learning Perl
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Hacking For Dummies
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Mastering Regular Expressions
  • DNS and BIND
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • HTML & XHTML: The Definitive Guide

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Web Hacking: Attacks and Defense Hacking Exposed 7 : Network Security Secrets & Solutions, Seventh Edition Hacker 6.0 Hakkeroinnin torjunta – uusimmat salaisuudet ja ratkaisut Hackers 2 - Secretos y Soluciones Para La Segurida

Share This Book