Goodreads helps you keep track of books you want to read.
Start by marking “Hacking Exposed 7” as Want to Read:
Hacking Exposed 7
Enlarge cover
Rate this book
Clear rating
Open Preview

Hacking Exposed 7

3.77  ·  Rating details ·  829 Ratings  ·  30 Reviews
A fully updated edition of the world's bestselling computer security book"Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCAD ...more
ebook, 720 pages
Published July 23rd 2012 by McGraw-Hill Education (first published February 1st 2003)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Hacking Exposed 7, please sign up.

Be the first to ask a question about Hacking Exposed 7

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Roberto Travagliante
Complete guide concerning security. I think this is the bible of hacking!
Rolancross
Mar 25, 2008 rated it really liked it  ·  review of another edition
i very like
Lesley Harrison
Feb 09, 2010 rated it really liked it  ·  review of another edition
Shelves: computer-books
A good desk reference.
Don
May 20, 2017 rated it it was ok  ·  review of another edition
Shelves: computer-science
Basic and outdated
Bill Leach
Case Study - An example of someone probing a system - use of the TOR network and an onion router for anonymity (torproject.org)

1 - Footprinting
- discovering the domain names, network blocks, subnets, routers and individual IP addresses on an entity
- publicly available information - company website, etc. - use phonenumber.com, yellowpages.com to look up physical addresses
- WHOIS and DNS enumeration
- DNS interrogation - using nslookup - determine mail exchange (MX) records using host commands
- net
...more
Gaetano
Mar 22, 2016 rated it did not like it  ·  review of another edition
Shelves: hacker
When I bought this book I was a bored and lazy 14 ys-old who wanted to become the Power Ranger of Computer Science. I mean if just by reading a thick and expensive book you can become a fucking ranger, wouldn't you buy it?
Nonetheless, it had been on my TO-READ-ASAP-YOUDUMB for more than 6 years, and I always wondered why. I mean the Art of Exploitation is a bit hard to follow, but you can read this without having to know about networks, memory or x32 Intel assembly. The problem is that it's very
...more
Prattle On, Boyo
Not a hacking how to per se but more like a really good resource for securing your network. Some people object to titles like this one because they naively and mistakenly believe it helps the bad guys. But in reality, without knowing black hat techniques there is no possible way that you can secure your network. Period. The authors do an outstand job of walking the uninformed reader through the process of the hack from initial surveillance up to and including the attack. Highly recommend this bo ...more
Alyssa
Dec 11, 2011 rated it it was amazing  ·  review of another edition
I had a friend who is an IT who recommended this book when I asked how he was able to track me down no matter where I got on the internet. This was a very well written book that was easy for me to understand. It made it a lot easier for me to understand how the internet works and how to properly secure my digital life. I would definitely recommend this book to more than just IT's and computer hacks.
Ayoub
Apr 29, 2014 rated it liked it  ·  review of another edition
Too broad

covers a lot of topics on the expense of detailed and practical discussion. The book title gives the impression that you are about to uncover the secrets of network security, instead it barely touches on the surface by naming and counting famous network security tools. I like to think of this book as a general reference for information security
William
Jul 27, 2011 rated it really liked it  ·  review of another edition
Very good for beginners. I picked up a few things I didn't know, it also helped me with my sorely lacking Windows hacking skills. Wished I found this book earlier. But I guess I benefited more from learning the hard way in the end.
Ryan
Jan 28, 2008 rated it really liked it  ·  review of another edition
HE is required reading for anyone with a network to secure. Also some of the attacks are quite interesting from an engineering standpoint.

Only drawback is that it doesn't go far enough. I would prefer to see more packet level information. Don't tell me it's an arp spoof, show me.
Nicholas Koh
Nov 05, 2016 rated it really liked it  ·  review of another edition
Hacking exposed 7

I liked that the book had covered a wide range of hacks - windows, wireless, mobile.

However, the book was lacking in the depth of techniques used for each attack. Would have preferred that the book described how each technique can be performed.
D
Apr 14, 2008 rated it liked it  ·  review of another edition
Good reference book to learn how to protect yourself. One thing I was hoping to get out of this book a how to do the hacks myself to myself own network and servers but that wasn't there. Safety precautions and legal liabilities I guess.
Vicki.has.answers
Neat computer tricks
Jesse
Jul 25, 2010 rated it really liked it  ·  review of another edition
Good read, lots of informative information on well... Hacking of course!
Takedown
Jan 05, 2011 rated it it was amazing  ·  review of another edition
Great overview book on information security in general.
Steve
Dec 13, 2014 rated it it was amazing  ·  review of another edition
Full of useful stuff. Clearly presented.
Jiri
Jul 13, 2014 rated it it was amazing  ·  review of another edition
By the date it was released the best non fiction hacking books full of examples. A must read for those who are interested in basics.
Kevin
Jul 03, 2008 rated it really liked it  ·  review of another edition
As far as these types of books go this book offers I think the widest range of exploits, tools, and analysis for the money.
Takedown
Feb 10, 2014 rated it really liked it  ·  review of another edition
Comprehensive as always. Good book for broad security topics and hackers techniques. Not that much new stuff from older editions and still have some outdated information, but anyway good book.
Pablo
Feb 02, 2015 rated it really liked it  ·  review of another edition
An enormously useful book for those interested in this particular field
Deepak Gupta
Comment...
Justin
Oct 06, 2014 rated it liked it  ·  review of another edition
overall, it was a good 1900 page book. my maon problem was the constant for more information, buy this book from the same people inatead of just including it in thw book itself
Veronica
Risk and vulnerability assessment for the network admin.
Omar
rated it it was ok
Dec 09, 2012
Paul
rated it liked it
Mar 27, 2014
Alex
rated it liked it
May 27, 2015
Dan Harper
rated it really liked it
Apr 19, 2012
Deval Agrifarman
rated it really liked it
Nov 05, 2013
Adriana Gamel
rated it really liked it
Jun 05, 2014
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Google Hacking for Penetration Testers, Volume 1
  • Reversing: Secrets of Reverse Engineering
  • Rootkits: Subverting the Windows Kernel (Addison-Wesley Software Security)
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Metasploit: The Penetration Tester's Guide
  • The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Hacking: The Art of Exploitation
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Hacking Linux Exposed: Linux Security Secrets & Solutions
  • Hacking For Dummies

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book