Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Prime Music Sweepstakes egg_2015 All-New Amazon Fire TV Grocery Gifts Under $50 Amazon Gift Card Offer cm15 cm15 cm15 $30 Off Amazon Echo $30 Off Fire HD 6 Kindle Cyber Monday Deals Cyber Monday Sweepstakes in Prime Music Outdoors Gift Guide on HTL
Hacking Exposed 5th Edition and over one million other books are available for Amazon Kindle. Learn more

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Hacking Exposed 5th Edition: Network Security Secrets And Solutions 5th Edition

17 customer reviews
ISBN-13: 978-0072260816
ISBN-10: 0072260815
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
Condition: Used: Very Good
Comment: Book is in very good condition. It may have some slight wear and possibly include a previous ownerâ€TMs name. We ship within 1 business day and offer no hassle returns. Big Hearted Books shares its profits with schools, churches and non-profit groups throughout New England. Thank you for your support!
Access codes and supplements are not guaranteed with used items.
58 Used from $0.01
More Buying Choices
17 New from $5.49 58 Used from $0.01 1 Collectible from $9.96

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more | Shop now

Editorial Reviews

From the Back Cover

"A must-read for anyone in security�. One of the best security books available." . --Tony Bradley, CISSP,


"Authoritative�.Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee


"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times


"The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." �Bill Machrone, PC Magazine


"With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." �Mirko Zorz,


The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven Hacking Exposed methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. .

. New and Updated Material:.

  • New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them.
  • New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits.
  • Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures.
  • Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners.
  • New content on remote connectivity including VoIP hacking.
  • New coverage of web and e-mail client hacking, including the latest Internet
  • Explorer exploits, phishing, spyware, rootkits, and bots.
  • New hacks and countermeasures using Google as a reconnaissance tool.
  • An updated footprinting chapter that deals with changes regarding finding information from Internet databases.
  • Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks

About the Author

Stuart McClure (Ladera Ranch, CA) is Senior Vice President of Risk Management Engineering for McAfee, where he is responsible for driving product strategy and marketing for the McAfee Foundstone family of risk mitigation and management solutions. McAfee Foundstone saves countless millions in revenue and hours annually in recovering from hacker attacks, viruses, worms, and malware. Prior to his role at McAfee, Stuart was founder, president, and chief technology officer at Foundstone, Inc., which was acquired by McAfee in October 2004..

. Widely recognized for his extensive and in-depth knowledge of security products, Stuart is considered one of the industry's leading authorities in information security today. A published and acclaimed security visionary, he brings many years of technology and executive leadership to McAfee Foundstone, along with profound technical, operational, and financial experience. At Foundstone, Stuart leads both product vision and strategy, and holds operational responsibilities for all technology development, support, and implementation. During his tenure, annual revenues grew over 100 percent every year since the company's inception in 1999..

. In 1999, he took the lead in authoring Hacking Exposed: Network Security Secrets And Solutions, the best-selling computer-security book ever, with over 500,000 copies sold to date. Stuart also coauthored Hacking Exposed: WIndows 2000 (McGraw-Hill/Osborne, 2001) and Web Hacking: Attacks and Defense (Addison-Wesley, 2002)..

. Prior to Foundstone, Stuart held a variety of leadership positions in security and IT management, with Ernst And Young's National Security Profiling Team, two years as an industry analyst with InfoWorld's Test Center, five years as director of IT with both state and local California governments, two years as owner of an IT consultancy, and two years in IT with the University of Colorado, Boulder..

. Stuary holds a bachelor's degree in psychology and philosophy, with an emphasis in computer science applications, from the University of Colorado, Boulder. He later earned numerous ceritifications, including ISC2's CISSP, Novell's CNE, and Check Point's CCSE..

. Joel Scambray (Woodinville, WA) is Senior Director of Security for Microsoft's MSN..

. George Kurtz (Conto de Caza, CA) is Senior Vice President of Risk Managemnt for McAfee.

. They are all best-selling authors of all four previous editions of Hacking Exposed. McClure and Scambray also co-authored Hacking Exposed Windows 2000 and Hacking Exposed Windows Server 2003. Scambray co-authored Hacking Exposed Web Applications and Kurtz contributed to Hacking Exposed Linux..


Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Series: Hacking Exposed
  • Paperback: 692 pages
  • Publisher: McGraw-Hill Osborne Media; 5 edition (April 19, 2005)
  • Language: English
  • ISBN-10: 0072260815
  • ISBN-13: 978-0072260816
  • Product Dimensions: 7.2 x 1.5 x 8.9 inches
  • Shipping Weight: 2.6 pounds
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (17 customer reviews)
  • Amazon Best Sellers Rank: #626,157 in Books (See Top 100 in Books)

Customer Reviews

Most Helpful Customer Reviews

18 of 19 people found the following review helpful By Tomas Znamenacek on January 21, 2006
Format: Paperback
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.

Some parts of the book are dated and should be left out or rewritten. Half of the URLs mentioned in the book does not work, because the websites have died a long time ago. Some nmap switches described in the text are not usable anymore, because the authors used an old version of nmap. A good deal of the text speaks about Windows NT, which is an OS almost unused today. There is a lot of typos in the book, which is quite unusal for a fifth edition. The HE website lists corrections for the first issue of the book, which is not very useful.

That said, I have learned a lot of interesting things from the book. It's a good book if you are trying to get the big picture-if you are looking for in-depth explanations and fresh information, I think you'd better look elsewhere. It's worth reading, I just wouldn't say it's a computer security Bible.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
10 of 12 people found the following review helpful By Thomas Duff HALL OF FAMETOP 1000 REVIEWERVINE VOICE on August 12, 2005
Format: Paperback
So much for the days of trusting everyone on-line to use software in the way that it was intended. Now the stakes are much higher, and attacking systems can be a profitable activity for those so inclined. To protect yourself, you need to understand the wide range of vulnerabilities. Reading Hacking Exposed (5th Edition) by Stuart McClure, Joel Scambray, and George Kurtz goes a long way towards getting you prepared.


Part 1 - Casing the Establishment: Footprinting; Scanning; Enumeration

Part 2 - System Hacking: Hacking Windows; Hacking Unix; Remote Connectivity and VoIP Hacking

Part 3 - Network Hacking: Network Drives; Wireless Hacking; Firewalls; Denial of Service Attacks

Part 4 - Software Hacking: Hacking Code; Web Hacking; Hacking the Internet User

Part 5 - Appendixes: Ports; Top 14 Security Vulnerabilities

Hacking Exposed follows a consistent format in covering areas subject to misuse and attack. They name the type of attack or information gathering technique and give it a risk rating based on popularity, simplicity, and impact. Following an explanation of the particular area, they follow up with a countermeasure section to help the reader understand how this type of attack or exploit can be mitigated. That format scores high on my practicality scale because you can immediately make changes to secure your environment. It's not as if they just spell out the doom and gloom and leave you to fend for yourself.

Another aspect of the book I like is the wide range of hacking covered. Admittedly, a number of these areas (such as hacking Unix or Windows) could easily be made into a whole separate book (and in most cases, they *have* been).
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
4 of 4 people found the following review helpful By TB on August 30, 2005
Format: Paperback
I recently received my copy of HE5 and despite some shortcomings (i.e. strong material removed from HE4) this book is a great overall security reference. The wireless stuff was a much needed component and although the book targets the latest O/S releases it's got a lot of useful discovery/fingerprinting techniques, including searching the web for sensitive info. Recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 3 people found the following review helpful By SBJ400 on July 27, 2006
Format: Paperback Verified Purchase
I cannot say anything more that other positive reviews have not already said.

Simply put, the Hacking Exposed series is THE source. However, it is getting tired and repetitive. Many topics covered in earlier chapters gets repeated AD NAUSEUM in later chapters.

Also, I feel this particular book is getting bloated at 750 pages. Hacking is a diverse subject. This book tries to narrow things down, but not enough in my opinion. The authors spread themselves too thin in some areas...thus adding to the page count unnecessarily. To their credit (and I love them dearly for this) they did not take chunks of old material and cut and paste like some other authors do! These guys keep the fresh material coming.

My 3 stars would have been 4 or 5 stars if I had seen really great improvements over the previous edition.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 3 people found the following review helpful By Frank Carreiro on August 1, 2007
Format: Paperback Verified Purchase
While starting out in a new career, this book has been recommended to me time and time again. I have some background in security and penetration testing however this book takes you into a deeper understanding of how things work. I strongly recommend it for the beginner as well as the seasoned Information Security Professional.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful By B. E. Hundley on July 30, 2007
Format: Paperback
This book offers an excellent overview of techniques, though some outdated, to exploit and secure systems. The book is easy to read with just enough technical jargon to teach you something. It covers most major exploits and the techniques used to secure your system against them. I have tested many of the exploits and tools and found them to work very well attacking and defending. If you are new to computer security this is a must-read. If you are an expert in the field this is a great reference.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful By Kepora Gebora on September 28, 2010
Format: Paperback Verified Purchase
PROS: It covers lots of, if not all information on either protecting your business from hackers, or if you ARE the hacker just trying to learn a few little tricks.

CONS: Requires a bit of previous knowledge of how network security works, for example, a lot computer jargon.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Want to discover more products? Check out these pages to see more: computer security, computer network