HackNotes(tm) Network Security Portable Reference 1st Edition

3 customer reviews
ISBN-13: 978-0072227833
ISBN-10: 0072227834
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
More Buying Choices
18 New from $16.76 37 Used from $0.01
Amazon Price New from Used from
Paperback, July 25, 2003
"Please retry"
$16.76 $0.01
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Rent Textbooks

Editorial Reviews

From the Inside Flap

INDUSTRY QUOTES

"Surprisingly complete. I have found this book to be quite useful and a great time-saver. There is nothing more irritating than thrashing in a search engine trying to remember some obscure tool or an obscure tool's obscure feature. A great reference for the working security consultant."
- Simple Nomad - Renowned Security Researcher and Author of The Hack FAQ

"While a little knowledge can be dangerous, no knowledge can be deadly. HackNotes: Network Security Portable Reference covers an immense amount of information readily available that is required for network and system administrators, who need the information quickly and concisely. This book is a must-have reference manual for any administrator."
- Ira Winkler - Chief Security Strategist at HP, security keynote speaker and panelist

"HackNotes puts readers in the attacker's shoes, perhaps a little too close. Security pros will find this reference a quick and easily digestible explanation of common vulnerabilities and how hackers exploit them. The step-by-step guides are almost too good and could be dangerous in the wrong hands. But for those wearing white hats, HackNotes is a great starting point for understanding how attackers enumerate, attack and escalate their digital intrusions."
- Lawrence M. Walsh - Managing Editor, Information Security Magazine

"A comprehensive security cheat sheet for those short on time. This book is ideal for the consultant on a customer site in need of a robust reference manual in a concise and easy to parse format."
- Mike Schiffman - CISSP, Researcher, Critical Infrastructure Assurance Group, Cisco Systems, creator of the Firewalk tool and author of Hacker's Challenge 1 & 2

"Heavy firepower for light infantry; Hack Notes delivers critical network security data where you need it most, in the field."
- Erik Pace Birkholz - Principal Consultant, Foundstone, and Author of Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle.

From the Back Cover

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code level techniques. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.

  • Use information security and risk assessment principles
  • Guard against common network threats and vulnerabilities
  • Understand hacker tactics and methods seen on the Internet and intranet
  • Protect common hacker and criminal targets
  • Conduct best practice security checks and hardening steps for your systems
  • Implement wireless security, Web application security, incident response, and more
  • Reference operating system and security specific commands
  • Access and utilize the best security and hacker tools in use today
  • Focus on the techniques, results, and remediation for a wide range of exploits
  • Protect networks, software code, e-commerce, and more
NO_CONTENT_IN_FEATURE


Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Series: Hacknotes
  • Paperback: 288 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (July 25, 2003)
  • Language: English
  • ISBN-10: 0072227834
  • ISBN-13: 978-0072227833
  • Product Dimensions: 5.9 x 0.6 x 8.9 inches
  • Shipping Weight: 14.9 ounces
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #2,963,902 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5 star
100%
4 star
0%
3 star
0%
2 star
0%
1 star
0%
See all 3 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

6 of 6 people found the following review helpful By Dr Anton Chuvakin on September 25, 2003
Format: Paperback
Now, let me disclaim that I am not a big fan of thin books claiming to be "comprehensive". In fact, I was deeply suspicious while getting this "Hacknotes" thing. Was I up for a pleasant surprise!! This book does deliver what it promises. It walks a fine line of being both wide and deep, which I am still amazed about. From risk assessment methodologies to "find / -perm 0400" in just 200 pages is no small feat.
I liked that the book and the entire series have a clearly stated goal, and readers can judge for themselves how well it delivered and there is no confusion as to "what should be there". The book is incredibly useful within those stated goals. Obviously, the book is not optimal for actually learning those methods and technologies, but it is an awesome reference in case you forget a thing or two or want to get an overview of a subject within network security. Unfortunately, the book will also benefit "script kiddies" by helping them to "hack without knowing how".
This includes high-level security principles, risk assessment (covering assets, threats and risks), hacking methodology (same as in "hacking Exposed") with details on all the attack stages (Discover, Scan, Enum, Exploit - split along the platform lines, Escalate, etc), wireless security, incident response (identification and recovery), pen testing and hardening. Amazing, but that is not all. It also covers web application security, social engineering, software flaws overview, war dialing and PBX hacking. Of course, all of the above is covered briefly, but thoroughly. Tools are mentioned where needed, and there is no excessive "tool obsession".
Yet another great component is several checklists.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 3 people found the following review helpful By Mike Schiffman on July 26, 2003
Format: Paperback
A comprehensive security cheat sheet for those short on time. This book is ideal for the consultant on a customer site in need of a robust reference manual in a concise and easy to parse format...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 2 people found the following review helpful By Concerned Parent on July 29, 2003
Format: Paperback
While a little knowledge can be dangerous, no knowledge can be deadly. HackNotes Network Security Portable Reference covers an immense amount of readily available information that is required for network and system administrators, who need the information quickly and concisely. This book is a must-have reference manual for any administrator.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Want to discover more products? Check out these pages to see more: hacking, networks, linux security