Automotive Holiday Deals Books Holiday Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Adele egg_2015 All-New Amazon Fire TV Grocery Gifts Under $50 Amazon Gift Card Offer bf15 bf15 bf15 $30 Off Amazon Echo Starting at $49.99 Kindle Black Friday Deals Outdoor Deals on DOTD
Hack Proofing Your Network 2E and over one million other books are available for Amazon Kindle. Learn more

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Hack Proofing Your Network (Second Edition) 2nd Edition

6 customer reviews
ISBN-13: 000-1928994709
ISBN-10: 1928994709
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$5.49 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$45.16 On clicking this link, a new layer will be open
More Buying Choices
24 New from $19.95 29 Used from $1.50
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Get Up to 80% Back Rent Textbooks
$45.16 FREE Shipping. Only 1 left in stock (more on the way). Ships from and sold by Gift-wrap available.

Frequently Bought Together

  • Hack Proofing Your Network (Second Edition)
  • +
  • Stealing the Network: How to Own the Box
Total price: $99.60
Buy the selected items together

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more

Editorial Reviews


Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic

About the Author

Ryan Russell is the best-selling author of Hack Proofing Your Network: Internet Tradecraft (Syngress Publishing, ISBN: 1-928994-15-6). He is an Incident Analyst at SecurityFocus, has served as an expert witness on security topics, and has done internal security investigation for a major software vendor. Ryan has been working in the IT field for over 13 years, the last 7 of which have been spent primarily in information security. He has been an active participant in various security mailing lists, such as BugTraq, for years, and is frequently sought after as a speaker at security conferences. Ryan has contributed to four other Syngress Publishing titles on the topic of networking, and four on the topic of security. He holds a Bachelors of Science degree in Computer Science.

Dan “Effugas” Kaminsky (CISSP) worked for two years at Cisco Systems designing security infrastructure for large-scale network monitoring systems. Dan has delivered presentations at several major industry conferences including Linuxworld, DEF CON, and the Black Hat Briefings, and he also contributes actively to OpenSSH, one of the more significant cryptographic systems in use today.He is based in Silicon Valley, presently studying Operation and Management of Information Systems at Santa Clara University in California.

Rain Forest Puppy is a security research and development consultant for a Midwest-based security consulting company. RFP has been working in R&D and coding in various languages for over seven years. While the Web is his primary hobby focus point, he has also played in other realms including: Linux kernel security patches, lockdown of various Windows and UNIX operating systems, and the development of honeypots and other attack alert tools. In the past he's reported on SQL tampering and common CGI problems, and has contributed security tools (like whisker) to the information security community.


Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Paperback: 824 pages
  • Publisher: Syngress; 2 edition (March 2002)
  • Language: English
  • ISBN-10: 1928994709
  • ISBN-13: 978-1928994701
  • Product Dimensions: 7.5 x 1.8 x 9.2 inches
  • Shipping Weight: 3.1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #2,623,879 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See all 6 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

19 of 19 people found the following review helpful By Marco De Vivo on April 27, 2002
Format: Paperback Verified Purchase
When I read the first edition of this book, was truly disappointed. I was wondering how such people could have written such book. Not that the book was worthless, but too 'standard' to met the expectations I had from these guys.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
10 of 10 people found the following review helpful By Richard Bejtlich on March 28, 2002
Format: Paperback
It's difficult to find original material in most security books. "Hack Proofing Your Network, 2nd Edition" (HPYN2E) breaks that trend. Responding to feedback on the first edition, the authors have made numerous improvements in the second edition. If you're looking for relatively novel content in a security book, read the sections of HPYN2E I discuss next.
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.

While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.

Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
6 of 7 people found the following review helpful By Ryan Smyth on March 11, 2002
Format: Paperback
I picked this book up about a week ago, and have been reading it ever since- I'm reading slow because it's *really* packed with info. There is tremendous coverage on everything from Buffer Overflow, Format Strings, Tunneling, etc. I've spent a ton of time reading Chapter 12 on Spoofing- extremely well-done! There's coverage here of such things as:
* Spoofing SSL by using web graphics to simulate the appearance of an SSL encrypted connection. After all, the user doesn't know what's on the wire, only what's on the screen.
* Routing packets in userspace using libnet and libpcap- a step by step tutorial
* Establishing a TCP connection between two firewalled and NATted hosts by setting a low time-to-live on a connection request and having some broker on the internet spoof a connection response.
This book is an absolute must to own...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Hack Proofing Your Network (Second Edition)
This item: Hack Proofing Your Network (Second Edition)
Price: $45.16
Ships from and sold by
Want to discover more products? Check out these pages to see more: creative labs sound blaster e1, creative labs sound blaster bluetooth