HomeGroupsTalkMoreZeitgeist
Search Site
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.

Results from Google Books

Click on a thumbnail to go to Google Books.

Hacking Exposed: Network Security Secrets &…
Loading...

Hacking Exposed: Network Security Secrets & Solutions, Second Edition (Hacking Exposed) (edition 2000)

by Joel Scambray, Stuart McClure, George Kurtz

MembersReviewsPopularityAverage ratingMentions
709331,883 (3.25)3
High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies
Member:MarillaWhat
Title:Hacking Exposed: Network Security Secrets & Solutions, Second Edition (Hacking Exposed)
Authors:Joel Scambray
Other authors:Stuart McClure, George Kurtz
Info:McGraw-Hill/OsborneMedia (2000), Edition: 2, Paperback, 703 pages
Collections:Your library
Rating:
Tags:Home

Work Information

Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed) by Stuart McClure

Recently added byzhuazhua88, synshop, betsy-glass
None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 3 mentions

Showing 3 of 3
Brilliant book. Every security practitioner & sysadmin should read it. ( )
  jaygheiser | Jul 23, 2008 |
A very basic look at methods of compromising computer security. The book is aimed at legitimate Computer Systems Administrators and teaches where the usual security holes are in Windows based networks. Some common exploits are discussed and you are shown how to test for them on your network.

The techniques discussed here are easily blocked by modifying the network security settings. While an eye opener for many people, it is hardly the definitive work on the topic nor does it expose any really serious methods. A truly determined hacker will use methods not discussed here. The true hacker world is in a state of constant evolution: shortly after a security hole is patched, someone with too much time on their hands finds a way around it.

All in all, the book is a good reference or a good goal to list on your work evaluations to show your boss you are taking security seriously. ( )
  PghDragonMan | Dec 15, 2007 |
Showing 3 of 3
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Original language
Canonical DDC/MDS
Canonical LCC

References to this work on external resources.

Wikipedia in English (5)

High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text provides network administrators with a reference for implementing and maintaining sound security policies

No library descriptions found.

Book description
Haiku summary

Current Discussions

None

Popular covers

Quick Links

Rating

Average: (3.25)
0.5
1 3
1.5
2 8
2.5 2
3 21
3.5
4 20
4.5
5 5

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 203,281,196 books! | Top bar: Always visible