Hacking Exposed, Sixth Edition and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $49.99
  • Save: $18.51 (37%)
FREE Shipping on orders over $35.
Only 1 left in stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Hacking Exposed: Network ... has been added to your Cart
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by NeBe
Condition: Used: Very Good
Comment: Ex-library book in excellent condition super fast shipping satisfaction guaranteed.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition Paperback – January 5, 2009

ISBN-13: 978-0071613743 ISBN-10: 0071613749 Edition: 6th

Buy New
Price: $31.48
18 New from $10.90 49 Used from $0.62
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$31.48
$10.90 $0.62
Unknown Binding
"Please retry"

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more.


Frequently Bought Together

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition + Network Security Bible + Rtfm: Red Team Field Manual
Price for all three: $77.75

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 720 pages
  • Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
  • Language: English
  • ISBN-10: 0071613749
  • ISBN-13: 978-0071613743
  • Product Dimensions: 7.4 x 1.4 x 9.1 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (22 customer reviews)
  • Amazon Best Sellers Rank: #657,086 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.

Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.

George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.

They are the bestselling coauthors of the five previous editions of Hacking Exposed.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Good book, good info.
Laurie A. Pine
Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network.
sixmonkeyjungle
I highly recommened to get the latest version if one decides to purchase this book.
Victor Leung

Most Helpful Customer Reviews

58 of 70 people found the following review helpful By Viken Derderian on June 19, 2009
Format: Kindle Edition
My first exposure with hacking series was back in 2002 the 2nd edition, in the Foreword of the 2nd edition they summed up the expectation and identified the who should read this book "...But if a computer network has a security vulnerability and no one knows about it, is it insecure?".
In writing this review I like to bring to attention the fact that I am not sure who is the intended audience anymore.
I have seen this book on every network engineer's and self proclaimed security guru's book shelf, many of the one's I have seen were not even used once.
So my question is why do people keep on buying this book, is it the title? The marketing? Or is it a cult think? I was given the 6th edition as a gift. I read most of it out of curiosity, and after a while I realized that this book does not have a true audience.

This book is not written for;
.-The hacker since many of the hacking techniques are either irrelevant or old and most hackers know a better way.
.-The criminal. See previous note.
.-An auditor. If it was, it would have specific processes on how to conduct and audit.
.-Management, they don't care how hping2 works.
.-Those who are concerned about wireless security. There is a "hacking exposed for wireless" book for them.

If we take away the fat, this book has about 200 pages of useful information, most of which can be found using the authors favorite search engine Google
why did I give it a 2 star instead of just 1, I did like the entire 10th Chapter, this section has very relevant information, and it has a purpose, it introduces the concept of governance and use of standards such as ISO17799 which is actually ISO27001:2005 and NIST Publications 800-64 and 800-27. It explains the SDLC although the author calls it SDL combining the Life with Cycle. So if this is your First Hacking Exposed book, buy it with caution, but if you already have one, don't "upgrade".
Best Fishes and thank you for reading.
4 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 22 people found the following review helpful By sixmonkeyjungle on February 9, 2009
Format: Paperback
George Kurtz, Stuart McClure and Joel Scambray have been a staple of my Information Security library since the first Hacking Exposed book. Things change quickly in the security world and the authors of Hacking Exposed 6: Network Security Secrets & Solutions have done a tremendous job at taking a great thing and making it better by updating it with new attacks and countermeasures.

Kurtz, McClure, and Scambray have maintained the core of what makes Hacking Exposed indispensible and they have once again added to and updated the information to keep the book current with the latest attacks, exploits and hacker techniques.

The basic format of the book remains the same. The beginning covers footprinting, scanning and enumeration to identify potential target systems. It then moves on to a section regarding system hacking, divided into Windows and Unix sections, then into Infrastructure Hacking with sections on Remote Connectivity or VoIP hacking, Network Devices, Wireless Hacking, and Hacking Hardware.

The appendices list commonly used TCP and UDP ports and the services that use them as well as providing a graphic representation of the Top 14 Security Vulnerabilities.

There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them. Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network. Hands down, Hacking Exposed 6 should be on every network or security administrator's desk for quick reference.

Buy this book. Even if you already have a previous edition, the new and updated information in this book are worth the investment.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By psimoes on September 18, 2011
Format: Paperback
Good book, giving a big overview of the hacking scene. Mainly focused on old-school hacking(networking), it's a good read before attacking the other books of the series (Hacking Windows Exposed, Hacking Linux Exposed, etc), it will give you a introduction to those more focused readings. Maybe on some chapters, the authors abuse the list of tools, not paying much attention to the concept behind, but in a general way its well balanced. I face this book like a reference and all the security people should have it on their bookshelves.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Justin on November 30, 2010
Format: Paperback Verified Purchase
Normally I wouldn't take the time and/or effort to write a review about a book. But, this is book is by far the best book I have purchased so far. Throughout the years I have purchased several books (about 5-8 a week) over several years.

Most of the books I have purchased are relating to security and/or programming. This book provides great explanation without going over an average geek's head. In the same take, it has some very in-depth practices that will help you understand much of the most recent security practices and attacks that you need to know.

The biggest pro to this book is that it builds you up to more advanced practices. It starts with foot printing networks then works it way up to exercising current practices. Also, it gives you the impression of thinking on your own.

Due to this book, I have already ordered the rest of the series and am looking forward to it. Any serious security professional needs to read this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By Alan Turing 2007 on April 20, 2010
Format: Paperback
I very much like the hacking exposed series. It provides solid coverage of many topics ranging from scanning and enumeration to privilege escalation. If you are looking for an introduction to the hacking world this is it.

My complaint is that each new edition does not have nearly enough differences with previous editions. Frankly if you have version 5, you can skip six. I have learned to buy about every 2nd or 3rd edition.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews