An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle eBooks lesen - auch ohne Kindle-Gerät - mit der gratis Kindle Lese-App für Smartphones und Tablets.
Hacking Exposed 5th Edition: Network Security Secrets and Solutions
 
 

Hacking Exposed 5th Edition: Network Security Secrets and Solutions [Kindle Edition]

Joel Scambray , Stuart McClure , George Kurtz

Kindle-Preis: EUR 25,88 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

  • Länge: 750 Seiten
  • Sprache: Englisch
  • Aufgrund der Dateigröße dauert der Download dieses Buchs möglicherweise länger.
  • Sie haben noch keinen Kindle? Hier kaufen Oder fangen Sie mit einer unserer gratis Kindle Lese-Apps sofort an zu lesen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 25,88  
Taschenbuch EUR 34,50  

Produktbeschreibungen

Kurzbeschreibung

“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine

"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine

"For almost any computer book, you can find a clone. But not this one... A one-of-a-kind study of the art of breaking in." --UNIX Review

Here is the latest edition of international best-seller, Hacking Exposed. Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. Coverage includes:

  • Code hacking methods and countermeasures
  • New exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications
  • Latest DDoS techniques--zombies, Blaster, MyDoom
  • All new class of vulnerabilities--HTTP Response Splitting
  • and much more

Synopsis

"The seminal book on white-hat hacking and countermeasures...Should be required reading for anyone with a server or a network to secure." - Bill Machrone, "PC Magazine". "The definitive compendium of intruder practices and tools." - Steve Steinke, "Network Magazine". "For almost any computer book, you can find a clone. But not this one...A one-of-a-kind study of the art of breaking in." - "UNIX Review". Here is the latest edition of international best-seller, "Hacking Exposed".Using real-world case studies, renowned security experts Stuart McClure, Joel Scambray, and George Kurtz show IT professionals how to protect computers and networks against the most recent security vulnerabilities. You'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. The coverage includes: code hacking methods and countermeasures; new exploits for Windows 2003 Server, UNIX/Linux, Cisco, Apache, and Web and wireless applications; latest DDoS techniques - zombies, Blaster, MyDoom; All new class of vulnerabilities - HTTP Response Splitting; and much more.

Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 11407 KB
  • Seitenzahl der Print-Ausgabe: 692 Seiten
  • Gleichzeitige Verwendung von Geräten: Bis zu 4 Geräte gleichzeitig, je nach vom Verlag festgelegter Grenze
  • Verlag: McGraw-Hill Osborne Media; Auflage: 5 (19. April 2005)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ISBN-10: 0072260815
  • ISBN-13: 978-0072260816
  • ASIN: B000MAHCPE
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Amazon Bestseller-Rang: #330.906 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.5 von 5 Sternen  17 Rezensionen
18 von 19 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Good, but aging 21. Januar 2006
Von Tomas Znamenacek - Veröffentlicht auf Amazon.com
Format:Taschenbuch
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.

Some parts of the book are dated and should be left out or rewritten. Half of the URLs mentioned in the book does not work, because the websites have died a long time ago. Some nmap switches described in the text are not usable anymore, because the authors used an old version of nmap. A good deal of the text speaks about Windows NT, which is an OS almost unused today. There is a lot of typos in the book, which is quite unusal for a fifth edition. The HE website lists corrections for the first issue of the book, which is not very useful.

That said, I have learned a lot of interesting things from the book. It's a good book if you are trying to get the big picture-if you are looking for in-depth explanations and fresh information, I think you'd better look elsewhere. It's worth reading, I just wouldn't say it's a computer security Bible.
10 von 12 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An excellent source of security information... 13. August 2005
Von Thomas Duff - Veröffentlicht auf Amazon.com
Format:Taschenbuch
So much for the days of trusting everyone on-line to use software in the way that it was intended. Now the stakes are much higher, and attacking systems can be a profitable activity for those so inclined. To protect yourself, you need to understand the wide range of vulnerabilities. Reading Hacking Exposed (5th Edition) by Stuart McClure, Joel Scambray, and George Kurtz goes a long way towards getting you prepared.

Contents:

Part 1 - Casing the Establishment: Footprinting; Scanning; Enumeration

Part 2 - System Hacking: Hacking Windows; Hacking Unix; Remote Connectivity and VoIP Hacking

Part 3 - Network Hacking: Network Drives; Wireless Hacking; Firewalls; Denial of Service Attacks

Part 4 - Software Hacking: Hacking Code; Web Hacking; Hacking the Internet User

Part 5 - Appendixes: Ports; Top 14 Security Vulnerabilities

Hacking Exposed follows a consistent format in covering areas subject to misuse and attack. They name the type of attack or information gathering technique and give it a risk rating based on popularity, simplicity, and impact. Following an explanation of the particular area, they follow up with a countermeasure section to help the reader understand how this type of attack or exploit can be mitigated. That format scores high on my practicality scale because you can immediately make changes to secure your environment. It's not as if they just spell out the doom and gloom and leave you to fend for yourself.

Another aspect of the book I like is the wide range of hacking covered. Admittedly, a number of these areas (such as hacking Unix or Windows) could easily be made into a whole separate book (and in most cases, they *have* been). But I really don't want to have to buy a dozen books to gain a broad overview of my potential exposure. I want to cover everything at a reasonable level of detail to understand the overall subject. Then if I have the need to get into more detail (like if I need to focus on firewalls), I at least have a framework on which to dive deeper into the subject matter. Hacking Exposed gives me that "reasonable level", and it's greatly appreciated.

Does this book cover every single hack or vulnerability out there? No, and no book (or web site or anything else) ever could. New attacks are discovered and exploited every day. But this gives you a very good knowledge base on which to understand current and future problems. It's a book I'd recommend highly to anyone who needs to understand security. And that should be everyone...
4 von 4 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Good overall security reference 30. August 2005
Von TB - Veröffentlicht auf Amazon.com
Format:Taschenbuch
I recently received my copy of HE5 and despite some shortcomings (i.e. strong material removed from HE4) this book is a great overall security reference. The wireless stuff was a much needed component and although the book targets the latest O/S releases it's got a lot of useful discovery/fingerprinting techniques, including searching the web for sensitive info. Recommended.
3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Excellent book for the beginner 1. August 2007
Von Frank Carreiro - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Von Amazon bestätigter Kauf
While starting out in a new career, this book has been recommended to me time and time again. I have some background in security and penetration testing however this book takes you into a deeper understanding of how things work. I strongly recommend it for the beginner as well as the seasoned Information Security Professional.
3 von 3 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Still solid but redundant and a bit tired 27. Juli 2006
Von SBJ400 - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Von Amazon bestätigter Kauf
I cannot say anything more that other positive reviews have not already said.

Simply put, the Hacking Exposed series is THE source. However, it is getting tired and repetitive. Many topics covered in earlier chapters gets repeated AD NAUSEUM in later chapters.

Also, I feel this particular book is getting bloated at 750 pages. Hacking is a diverse subject. This book tries to narrow things down, but not enough in my opinion. The authors spread themselves too thin in some areas...thus adding to the page count unnecessarily. To their credit (and I love them dearly for this) they did not take chunks of old material and cut and paste like some other authors do! These guys keep the fresh material coming.

My 3 stars would have been 4 or 5 stars if I had seen really great improvements over the previous edition.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Beliebte Markierungen

 (Was ist das?)
&quote;
SiteDigger (Figure 1-5) allows you to target specific domains, uses the GHDB or the streamlined Foundstone list of searches, allows you to submit new searches to be added to the database, allows for raw searches, andbest of allhas an update feature that downloads the latest GHDB and/or Foundstone searches right into the tool so you never miss a beat. &quote;
Markiert von 3 Kindle-Nutzern
&quote;
Cain & Abel (http://www.oxid.it). &quote;
Markiert von 3 Kindle-Nutzern

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


ARRAY(0xae36d300)