Hacking Exposed, Sixth Edition and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $49.99
  • Save: $18.51 (37%)
FREE Shipping on orders over $35.
Only 1 left in stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Hacking Exposed: Network ... has been added to your Cart
FREE Shipping on orders over $35.
Used: Good | Details
Sold by giggil
Condition: Used: Good
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition Paperback – January 5, 2009

ISBN-13: 978-0071613743 ISBN-10: 0071613749 Edition: 6th

Buy New
Price: $31.48
16 New from $10.99 48 Used from $0.50
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$31.48
$10.99 $0.50
Unknown Binding
"Please retry"

Customers Who Bought This Item Also Bought


Editorial Reviews

About the Author

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.

Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.

George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.

They are the bestselling coauthors of the five previous editions of Hacking Exposed.

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 720 pages
  • Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
  • Language: English
  • ISBN-10: 0071613749
  • ISBN-13: 978-0071613743
  • Product Dimensions: 7.4 x 1.4 x 9.1 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (22 customer reviews)
  • Amazon Best Sellers Rank: #568,552 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Good book, good info.
Laurie A. Pine
Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network.
sixmonkeyjungle
I highly recommened to get the latest version if one decides to purchase this book.
Victor Leung

Most Helpful Customer Reviews

58 of 70 people found the following review helpful By Viken Derderian on June 19, 2009
Format: Kindle Edition
My first exposure with hacking series was back in 2002 the 2nd edition, in the Foreword of the 2nd edition they summed up the expectation and identified the who should read this book "...But if a computer network has a security vulnerability and no one knows about it, is it insecure?".
In writing this review I like to bring to attention the fact that I am not sure who is the intended audience anymore.
I have seen this book on every network engineer's and self proclaimed security guru's book shelf, many of the one's I have seen were not even used once.
So my question is why do people keep on buying this book, is it the title? The marketing? Or is it a cult think? I was given the 6th edition as a gift. I read most of it out of curiosity, and after a while I realized that this book does not have a true audience.

This book is not written for;
.-The hacker since many of the hacking techniques are either irrelevant or old and most hackers know a better way.
.-The criminal. See previous note.
.-An auditor. If it was, it would have specific processes on how to conduct and audit.
.-Management, they don't care how hping2 works.
.-Those who are concerned about wireless security. There is a "hacking exposed for wireless" book for them.

If we take away the fat, this book has about 200 pages of useful information, most of which can be found using the authors favorite search engine Google
why did I give it a 2 star instead of just 1, I did like the entire 10th Chapter, this section has very relevant information, and it has a purpose, it introduces the concept of governance and use of standards such as ISO17799 which is actually ISO27001:2005 and NIST Publications 800-64 and 800-27. It explains the SDLC although the author calls it SDL combining the Life with Cycle. So if this is your First Hacking Exposed book, buy it with caution, but if you already have one, don't "upgrade".
Best Fishes and thank you for reading.
4 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 22 people found the following review helpful By sixmonkeyjungle on February 9, 2009
Format: Paperback
George Kurtz, Stuart McClure and Joel Scambray have been a staple of my Information Security library since the first Hacking Exposed book. Things change quickly in the security world and the authors of Hacking Exposed 6: Network Security Secrets & Solutions have done a tremendous job at taking a great thing and making it better by updating it with new attacks and countermeasures.

Kurtz, McClure, and Scambray have maintained the core of what makes Hacking Exposed indispensible and they have once again added to and updated the information to keep the book current with the latest attacks, exploits and hacker techniques.

The basic format of the book remains the same. The beginning covers footprinting, scanning and enumeration to identify potential target systems. It then moves on to a section regarding system hacking, divided into Windows and Unix sections, then into Infrastructure Hacking with sections on Remote Connectivity or VoIP hacking, Network Devices, Wireless Hacking, and Hacking Hardware.

The appendices list commonly used TCP and UDP ports and the services that use them as well as providing a graphic representation of the Top 14 Security Vulnerabilities.

There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them. Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network. Hands down, Hacking Exposed 6 should be on every network or security administrator's desk for quick reference.

Buy this book. Even if you already have a previous edition, the new and updated information in this book are worth the investment.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By psimoes on September 18, 2011
Format: Paperback
Good book, giving a big overview of the hacking scene. Mainly focused on old-school hacking(networking), it's a good read before attacking the other books of the series (Hacking Windows Exposed, Hacking Linux Exposed, etc), it will give you a introduction to those more focused readings. Maybe on some chapters, the authors abuse the list of tools, not paying much attention to the concept behind, but in a general way its well balanced. I face this book like a reference and all the security people should have it on their bookshelves.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Justin on November 30, 2010
Format: Paperback Verified Purchase
Normally I wouldn't take the time and/or effort to write a review about a book. But, this is book is by far the best book I have purchased so far. Throughout the years I have purchased several books (about 5-8 a week) over several years.

Most of the books I have purchased are relating to security and/or programming. This book provides great explanation without going over an average geek's head. In the same take, it has some very in-depth practices that will help you understand much of the most recent security practices and attacks that you need to know.

The biggest pro to this book is that it builds you up to more advanced practices. It starts with foot printing networks then works it way up to exercising current practices. Also, it gives you the impression of thinking on your own.

Due to this book, I have already ordered the rest of the series and am looking forward to it. Any serious security professional needs to read this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By Alan Turing 2007 on April 20, 2010
Format: Paperback
I very much like the hacking exposed series. It provides solid coverage of many topics ranging from scanning and enumeration to privilege escalation. If you are looking for an introduction to the hacking world this is it.

My complaint is that each new edition does not have nearly enough differences with previous editions. Frankly if you have version 5, you can skip six. I have learned to buy about every 2nd or 3rd edition.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


Frequently Bought Together

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition + Network Security Bible + Rtfm: Red Team Field Manual
Price for all three: $74.77

Buy the selected items together