Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)
Enlarge cover
Rate this book
Clear rating

Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)

3.74 of 5 stars 3.74  ·  rating details  ·  422 ratings  ·  16 reviews
High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies
Paperback, Second Edition, 703 pages
Published February 18th 2002 by McGraw-Hill/Osborne Media (first published September 10th 1999)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.
This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 1,240)
filter  |  sort: default (?)  |  rating details
Roberto Travagliante
Complete guide concerning security. I think this is the bible of hacking!
Bill Leach
Case Study - An example of someone probing a system - use of the TOR network and an onion router for anonymity (torproject.org)

1 - Footprinting
- discovering the domain names, network blocks, subnets, routers and individual IP addresses on an entity
- publicly available information - company website, etc. - use phonenumber.com, yellowpages.com to look up physical addresses
- WHOIS and DNS enumeration
- DNS interrogation - using nslookup - determine mail exchange (MX) records using host commands
- net...more
By the date it was released the best non fiction hacking books full of examples. A must read for those who are interested in basics.
Prattle On, Boyo
Not a hacking how to per se but more like a really good resource for securing your network. Some people object to titles like this one because they naively and mistakenly believe it helps the bad guys. But in reality, without knowing black hat techniques there is no possible way that you can secure your network. Period. The authors do an outstand job of walking the uninformed reader through the process of the hack from initial surveillance up to and including the attack. Highly recommend this bo...more
I had a friend who is an IT who recommended this book when I asked how he was able to track me down no matter where I got on the internet. This was a very well written book that was easy for me to understand. It made it a lot easier for me to understand how the internet works and how to properly secure my digital life. I would definitely recommend this book to more than just IT's and computer hacks.
HE is required reading for anyone with a network to secure. Also some of the attacks are quite interesting from an engineering standpoint.

Only drawback is that it doesn't go far enough. I would prefer to see more packet level information. Don't tell me it's an arp spoof, show me.
Very good for beginners. I picked up a few things I didn't know, it also helped me with my sorely lacking Windows hacking skills. Wished I found this book earlier. But I guess I benefited more from learning the hard way in the end.
Good reference book to learn how to protect yourself. One thing I was hoping to get out of this book a how to do the hacks myself to myself own network and servers but that wasn't there. Safety precautions and legal liabilities I guess.
As far as these types of books go this book offers I think the widest range of exploits, tools, and analysis for the money.
Good read, lots of informative information on well... Hacking of course!
Great overview book on information security in general.
Risk and vulnerability assessment for the network admin.
Neat computer tricks
i very like
Daniela marked it as to-read
Jul 24, 2014
J C marked it as to-read
Jul 24, 2014
Icqb marked it as to-read
Jul 19, 2014
Prathibha marked it as to-read
Jul 19, 2014
« previous 1 3 4 5 6 7 8 9 41 42 next »
  • Reversing: Secrets of Reverse Engineering
  • Hacking: The Art of Exploitation
  • The Practice of System and Network Administration
  • Metasploit: The Penetration Tester's Guide
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Computer Organization & Design: The Hardware/Software Interface
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Learning Perl
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Hacking For Dummies
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Mastering Regular Expressions
  • DNS and BIND
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • HTML & XHTML: The Definitive Guide

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Hacking Exposed Web Applications: Web Security Secrets & Solutions Hacking Exposed Windows: Windows Security Secrets & Solutions Windows 2000 (Hacking Exposed) Windows Server 2003 (Hacking Exposed) Web Applications (Hacking Exposed)

Share This Book