Hacking Exposed, Sixth Edition and over one million other books are available for Amazon Kindle. Learn more

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
More Buying Choices
Have one to sell? Sell yours here
Start reading Hacking Exposed, Sixth Edition on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition [Paperback]

Stuart McClure , Joel Scambray , George Kurtz
4.4 out of 5 stars  See all reviews (20 customer reviews)

List Price: $49.99
Price: $31.48 & FREE Shipping on orders over $35. Details
You Save: $18.51 (37%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 5 left in stock.
Ships from and sold by Amazon.com. Gift-wrap available.
Want it Monday, July 14? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Kindle Edition $35.99  
Paperback $31.48  
Unknown Binding --  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now
There is a newer edition of this item:
Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions) Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions) 4.5 out of 5 stars (37)
$29.58
In Stock.

Book Description

January 5, 2009 0071613749 978-0071613743 6

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

"For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems

"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company

"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code

Frequently Bought Together

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition + Network Security Bible
Price for both: $65.85

Buy the selected items together
  • Network Security Bible $34.37


Editorial Reviews

About the Author

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.

Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.

George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.

They are the bestselling coauthors of the five previous editions of Hacking Exposed.


Product Details

  • Paperback: 720 pages
  • Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
  • Language: English
  • ISBN-10: 0071613749
  • ISBN-13: 978-0071613743
  • Product Dimensions: 1.7 x 7.5 x 9.2 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (20 customer reviews)
  • Amazon Best Sellers Rank: #670,433 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews
58 of 70 people found the following review helpful
2.0 out of 5 stars 6Th Edition, why? June 19, 2009
Format:Kindle Edition
My first exposure with hacking series was back in 2002 the 2nd edition, in the Foreword of the 2nd edition they summed up the expectation and identified the who should read this book "...But if a computer network has a security vulnerability and no one knows about it, is it insecure?".
In writing this review I like to bring to attention the fact that I am not sure who is the intended audience anymore.
I have seen this book on every network engineer's and self proclaimed security guru's book shelf, many of the one's I have seen were not even used once.
So my question is why do people keep on buying this book, is it the title? The marketing? Or is it a cult think? I was given the 6th edition as a gift. I read most of it out of curiosity, and after a while I realized that this book does not have a true audience.

This book is not written for;
.-The hacker since many of the hacking techniques are either irrelevant or old and most hackers know a better way.
.-The criminal. See previous note.
.-An auditor. If it was, it would have specific processes on how to conduct and audit.
.-Management, they don't care how hping2 works.
.-Those who are concerned about wireless security. There is a "hacking exposed for wireless" book for them.

If we take away the fat, this book has about 200 pages of useful information, most of which can be found using the authors favorite search engine Google
why did I give it a 2 star instead of just 1, I did like the entire 10th Chapter, this section has very relevant information, and it has a purpose, it introduces the concept of governance and use of standards such as ISO17799 which is actually ISO27001:2005 and NIST Publications 800-64 and 800-27. It explains the SDLC although the author calls it SDL combining the Life with Cycle. So if this is your First Hacking Exposed book, buy it with caution, but if you already have one, don't "upgrade".
Best Fishes and thank you for reading.
Was this review helpful to you?
1 of 1 people found the following review helpful
By psimoes
Format:Paperback
Good book, giving a big overview of the hacking scene. Mainly focused on old-school hacking(networking), it's a good read before attacking the other books of the series (Hacking Windows Exposed, Hacking Linux Exposed, etc), it will give you a introduction to those more focused readings. Maybe on some chapters, the authors abuse the list of tools, not paying much attention to the concept behind, but in a general way its well balanced. I face this book like a reference and all the security people should have it on their bookshelves.
Comment | 
Was this review helpful to you?
15 of 22 people found the following review helpful
Format:Paperback
George Kurtz, Stuart McClure and Joel Scambray have been a staple of my Information Security library since the first Hacking Exposed book. Things change quickly in the security world and the authors of Hacking Exposed 6: Network Security Secrets & Solutions have done a tremendous job at taking a great thing and making it better by updating it with new attacks and countermeasures.

Kurtz, McClure, and Scambray have maintained the core of what makes Hacking Exposed indispensible and they have once again added to and updated the information to keep the book current with the latest attacks, exploits and hacker techniques.

The basic format of the book remains the same. The beginning covers footprinting, scanning and enumeration to identify potential target systems. It then moves on to a section regarding system hacking, divided into Windows and Unix sections, then into Infrastructure Hacking with sections on Remote Connectivity or VoIP hacking, Network Devices, Wireless Hacking, and Hacking Hardware.

The appendices list commonly used TCP and UDP ports and the services that use them as well as providing a graphic representation of the Top 14 Security Vulnerabilities.

There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them. Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network. Hands down, Hacking Exposed 6 should be on every network or security administrator's desk for quick reference.

Buy this book. Even if you already have a previous edition, the new and updated information in this book are worth the investment.
Comment | 
Was this review helpful to you?
2 of 3 people found the following review helpful
4.0 out of 5 stars Very good book- very minor issues April 20, 2010
Format:Paperback
I very much like the hacking exposed series. It provides solid coverage of many topics ranging from scanning and enumeration to privilege escalation. If you are looking for an introduction to the hacking world this is it.

My complaint is that each new edition does not have nearly enough differences with previous editions. Frankly if you have version 5, you can skip six. I have learned to buy about every 2nd or 3rd edition.
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Just what I expected May 16, 2014
Format:Paperback|Verified Purchase
Related information needed and impressed the contents of this book and as is the issue and read the references. Excellent!!!
Comment | 
Was this review helpful to you?
5.0 out of 5 stars Hacking Exposed September 6, 2013
Format:Paperback|Verified Purchase
This is a great reference book. I highly recommened to get the latest version if one decides to purchase this book.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars Good reference. November 25, 2012
By Tapper
Format:Paperback
A good reference although the examples are now outdated and do not reflect modern environments. Always a go back to book though.
Comment | 
Was this review helpful to you?
4.0 out of 5 stars SUPERIOR GUIDE FOR A COMPUTER NUT. November 20, 2012
Format:Paperback|Verified Purchase
VERY INFORMATIVE GUIDE. TONS OF INFORMATION BUT OVER THE HEAD OF AN AVERAGE JOE LIKE ME. OBVIOUSLY, THIS BOOK WAS DESIGNED FOR A MORE ADVANCED COMPUTER INDIVIDUAL BUT IT IS AN INTERESTING AND EDUCATIONAL READ.
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
5.0 out of 5 stars Great Addition to My Security Library
This is a very useful and comprehensive book. The authors make the information readable and easy to understand while at the same presenting some very good security concepts. Read more
Published on May 21, 2012 by Robert Dahl
5.0 out of 5 stars Great book for those learning the computer forensics
I have read the past four releases and each version gets better with more and better examples. As the computer and Internet and all the connecting pieces get complicated, all... Read more
Published on March 18, 2012 by Stuart I. Riley
5.0 out of 5 stars Hacking Exposed 6
This book in the series of "hacking exposed" fame is very much worth the time to read in search of the main methods of attacking network security and the methods of securing your... Read more
Published on January 12, 2012 by JohnL
5.0 out of 5 stars The best ever Security guide
I normally will sell or trade school books in after the quarter because I have no need for them. This book is beyond useful and is written to help the novice and guide the expert. Read more
Published on October 28, 2011 by Remi
5.0 out of 5 stars Excellent "Textbook" for Learning
This book was definitely a surprise when it arrived. It was much larger than I was expecting for the price I paid. Read more
Published on October 10, 2011 by JordanPlotnek
5.0 out of 5 stars Bitchen!
It's a decent book that gives you a basic idea of where to start. Nothing ground breaking or anything. Read more
Published on March 19, 2011 by David Splittberger
5.0 out of 5 stars Best Security Series
Normally I wouldn't take the time and/or effort to write a review about a book. But, this is book is by far the best book I have purchased so far. Read more
Published on November 30, 2010 by Justin
Search Customer Reviews
Search these reviews only


Forums

Have something you'd like to share about this product?
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Search Customer Discussions
Search all Amazon discussions


Look for Similar Items by Category