Buy Used
$14.09
FREE Shipping on orders over $35.
Condition: Used: Like New
Comment: Used, but looks brand new. Only very slight signs of use. Cover and binding are undamaged, and pages are crisp and unmarked. Unbeatable customer service, and we usually ship the same or next day. Over one million satisfied customers!
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

HackNotes(tm) Network Security Portable Reference Paperback – July 25, 2003

ISBN-13: 978-0072227833 ISBN-10: 0072227834 Edition: 1st

Used
Price: $14.09
21 New from $3.76 55 Used from $0.01
Amazon Price New from Used from
Paperback
"Please retry"
$3.76 $0.01

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Series: Hacknotes
  • Paperback: 288 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (July 25, 2003)
  • Language: English
  • ISBN-10: 0072227834
  • ISBN-13: 978-0072227833
  • Product Dimensions: 9 x 5.8 x 0.7 inches
  • Shipping Weight: 14.9 ounces
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #2,154,039 in Books (See Top 100 in Books)

Editorial Reviews

From the Inside Flap

INDUSTRY QUOTES

"Surprisingly complete. I have found this book to be quite useful and a great time-saver. There is nothing more irritating than thrashing in a search engine trying to remember some obscure tool or an obscure tool's obscure feature. A great reference for the working security consultant."
- Simple Nomad - Renowned Security Researcher and Author of The Hack FAQ

"While a little knowledge can be dangerous, no knowledge can be deadly. HackNotes: Network Security Portable Reference covers an immense amount of information readily available that is required for network and system administrators, who need the information quickly and concisely. This book is a must-have reference manual for any administrator."
- Ira Winkler - Chief Security Strategist at HP, security keynote speaker and panelist

"HackNotes puts readers in the attacker's shoes, perhaps a little too close. Security pros will find this reference a quick and easily digestible explanation of common vulnerabilities and how hackers exploit them. The step-by-step guides are almost too good and could be dangerous in the wrong hands. But for those wearing white hats, HackNotes is a great starting point for understanding how attackers enumerate, attack and escalate their digital intrusions."
- Lawrence M. Walsh - Managing Editor, Information Security Magazine

"A comprehensive security cheat sheet for those short on time. This book is ideal for the consultant on a customer site in need of a robust reference manual in a concise and easy to parse format."
- Mike Schiffman - CISSP, Researcher, Critical Infrastructure Assurance Group, Cisco Systems, creator of the Firewalk tool and author of Hacker's Challenge 1 & 2

"Heavy firepower for light infantry; Hack Notes delivers critical network security data where you need it most, in the field."
- Erik Pace Birkholz - Principal Consultant, Foundstone, and Author of Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle.

From the Back Cover

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code level techniques. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.

  • Use information security and risk assessment principles
  • Guard against common network threats and vulnerabilities
  • Understand hacker tactics and methods seen on the Internet and intranet
  • Protect common hacker and criminal targets
  • Conduct best practice security checks and hardening steps for your systems
  • Implement wireless security, Web application security, incident response, and more
  • Reference operating system and security specific commands
  • Access and utilize the best security and hacker tools in use today
  • Focus on the techniques, results, and remediation for a wide range of exploits
  • Protect networks, software code, e-commerce, and more

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5.0 out of 5 stars
5 star
3
4 star
0
3 star
0
2 star
0
1 star
0
See all 3 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

6 of 6 people found the following review helpful By Dr Anton Chuvakin on September 25, 2003
Format: Paperback
Now, let me disclaim that I am not a big fan of thin books claiming to be "comprehensive". In fact, I was deeply suspicious while getting this "Hacknotes" thing. Was I up for a pleasant surprise!! This book does deliver what it promises. It walks a fine line of being both wide and deep, which I am still amazed about. From risk assessment methodologies to "find / -perm 0400" in just 200 pages is no small feat.
I liked that the book and the entire series have a clearly stated goal, and readers can judge for themselves how well it delivered and there is no confusion as to "what should be there". The book is incredibly useful within those stated goals. Obviously, the book is not optimal for actually learning those methods and technologies, but it is an awesome reference in case you forget a thing or two or want to get an overview of a subject within network security. Unfortunately, the book will also benefit "script kiddies" by helping them to "hack without knowing how".
This includes high-level security principles, risk assessment (covering assets, threats and risks), hacking methodology (same as in "hacking Exposed") with details on all the attack stages (Discover, Scan, Enum, Exploit - split along the platform lines, Escalate, etc), wireless security, incident response (identification and recovery), pen testing and hardening. Amazing, but that is not all. It also covers web application security, social engineering, software flaws overview, war dialing and PBX hacking. Of course, all of the above is covered briefly, but thoroughly. Tools are mentioned where needed, and there is no excessive "tool obsession".
Yet another great component is several checklists.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 3 people found the following review helpful By Mike Schiffman on July 26, 2003
Format: Paperback
A comprehensive security cheat sheet for those short on time. This book is ideal for the consultant on a customer site in need of a robust reference manual in a concise and easy to parse format...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 2 people found the following review helpful By Concerned Parent on July 29, 2003
Format: Paperback
While a little knowledge can be dangerous, no knowledge can be deadly. HackNotes Network Security Portable Reference covers an immense amount of readily available information that is required for network and system administrators, who need the information quickly and concisely. This book is a must-have reference manual for any administrator.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search