Hack Proofing Your Network 2E and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $52.95
  • Save: $12.18 (23%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Hack Proofing Your Networ... has been added to your Cart
FREE Shipping on orders over $35.
Condition: Used: Good
Comment: Minor signs of wear. Eligible for FREE Super Saver/Prime Shipping. Amazon Customer Service 24/7 with Delivery Tracking. Receive Your Item in 3-5 Business Days!
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hack Proofing Your Network (Second Edition) Paperback – April 25, 2002

ISBN-13: 000-1928994709 ISBN-10: 1928994709 Edition: 2nd

Buy New
Price: $40.77
30 New from $8.00 34 Used from $0.01 1 Collectible from $9.98
Amazon Price New from Used from
Kindle
"Please retry"
School & Library Binding
"Please retry"
Paperback
"Please retry"
$40.77
$8.00 $0.01
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Customers Who Bought This Item Also Bought


Editorial Reviews

Review

Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic

About the Author

Ryan Russell is the best-selling author of Hack Proofing Your Network: Internet Tradecraft (Syngress Publishing, ISBN: 1-928994-15-6). He is an Incident Analyst at SecurityFocus, has served as an expert witness on security topics, and has done internal security investigation for a major software vendor. Ryan has been working in the IT field for over 13 years, the last 7 of which have been spent primarily in information security. He has been an active participant in various security mailing lists, such as BugTraq, for years, and is frequently sought after as a speaker at security conferences. Ryan has contributed to four other Syngress Publishing titles on the topic of networking, and four on the topic of security. He holds a Bachelors of Science degree in Computer Science.

Dan “Effugas” Kaminsky (CISSP) worked for two years at Cisco Systems designing security infrastructure for large-scale network monitoring systems. Dan has delivered presentations at several major industry conferences including Linuxworld, DEF CON, and the Black Hat Briefings, and he also contributes actively to OpenSSH, one of the more significant cryptographic systems in use today.He is based in Silicon Valley, presently studying Operation and Management of Information Systems at Santa Clara University in California.

Rain Forest Puppy is a security research and development consultant for a Midwest-based security consulting company. RFP has been working in R&D and coding in various languages for over seven years. While the Web is his primary hobby focus point, he has also played in other realms including: Linux kernel security patches, lockdown of various Windows and UNIX operating systems, and the development of honeypots and other attack alert tools. In the past he's reported on SQL tampering and common CGI problems, and has contributed security tools (like whisker) to the information security community.

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 824 pages
  • Publisher: Syngress; 2 edition (April 25, 2002)
  • Language: English
  • ISBN-10: 1928994709
  • ISBN-13: 978-1928994701
  • Product Dimensions: 7.5 x 1.6 x 9.2 inches
  • Shipping Weight: 3.1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Best Sellers Rank: #1,706,357 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.6 out of 5 stars
5 star
3
4 star
2
3 star
0
2 star
0
1 star
0
See all 5 customer reviews
Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book.
Richard Bejtlich
I picked this book up about a week ago, and have been reading it ever since- I'm reading slow because it's *really* packed with info.
Ryan Smyth
I have the first edition of this book also, and I was really glad to see the second edition come out.
Jason Beckwith

Most Helpful Customer Reviews

19 of 19 people found the following review helpful By Marco De Vivo on April 27, 2002
Format: Paperback Verified Purchase
When I read the first edition of this book, was truly disappointed. I was wondering how such people could have written such book. Not that the book was worthless, but too 'standard' to met the expectations I had from these guys.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
10 of 10 people found the following review helpful By Richard Bejtlich on March 28, 2002
Format: Paperback
It's difficult to find original material in most security books. "Hack Proofing Your Network, 2nd Edition" (HPYN2E) breaks that trend. Responding to feedback on the first edition, the authors have made numerous improvements in the second edition. If you're looking for relatively novel content in a security book, read the sections of HPYN2E I discuss next.
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.

While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.

Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 7 people found the following review helpful By Ryan Smyth on March 11, 2002
Format: Paperback
I picked this book up about a week ago, and have been reading it ever since- I'm reading slow because it's *really* packed with info. There is tremendous coverage on everything from Buffer Overflow, Format Strings, Tunneling, etc. I've spent a ton of time reading Chapter 12 on Spoofing- extremely well-done! There's coverage here of such things as:
* Spoofing SSL by using web graphics to simulate the appearance of an SSL encrypted connection. After all, the user doesn't know what's on the wire, only what's on the screen.
* Routing packets in userspace using libnet and libpcap- a step by step tutorial
* Establishing a TCP connection between two firewalled and NATted hosts by setting a low time-to-live on a connection request and having some broker on the internet spoof a connection response.
This book is an absolute must to own...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Jason Beckwith on March 13, 2002
Format: Paperback
I have the first edition of this book also, and I was really glad to see the second edition come out. There are some great hacking books out now, but I really think these ones are the best. I found in depth coverage on a lot of stuff you just can't find any place else. Some very cool info. on administering hosts locked behind a firewall and tips for making a "poor man's VPN". I also like that a lot of big names wrote the book, and their personalities really come through. A lot of tech. books can be a little dry even if they are well written. This one is actually entertaining also.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Konstantin Ivanov on October 14, 2004
Format: Paperback Verified Purchase
The books offers some basic theory and knowledge. Not very practical though. Good starting point and reference book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again