Programming Books C Java PHP Python Learn more Browse Programming Books
Hacking Exposed 7: Network Security Secrets and Solutions and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $50.00
  • Save: $34.00 (68%)
Rented from apex_media
To Rent, select Shipping State from options above
Due Date: Dec 21, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
FREE Shipping on orders over $35.
Used: Like New | Details
Sold by bookoutlet1
Condition: Used: Like New
Comment: May have a remainder mark. SHIPS DIRECTLY FROM AMAZON. Book is in great shape.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $50.00
  • Save: $18.45 (37%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $12.32
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions) Paperback – July 11, 2012

ISBN-13: 978-0071780285 ISBN-10: 0071780289 Edition: 7th

Buy New
Price: $31.55
Rent
Price: $16.00
57 New from $26.37 36 Used from $14.82
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$31.55
$26.37 $14.82

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student




Frequently Bought Together

Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions) + Hacking: The Art of Exploitation, 2nd Edition + The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
Price for all three: $82.71

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Series: Hacking Exposed: Network Security Secrets & Solutions
  • Paperback: 768 pages
  • Publisher: McGraw-Hill Osborne Media; 7 edition (July 11, 2012)
  • Language: English
  • ISBN-10: 0071780289
  • ISBN-13: 978-0071780285
  • Product Dimensions: 9.2 x 7.3 x 1.7 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (40 customer reviews)
  • Amazon Best Sellers Rank: #46,933 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004.

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Customer Reviews

4.5 out of 5 stars
5 star
25
4 star
11
3 star
3
2 star
0
1 star
1
See all 40 customer reviews
Overall an excellent book and easy to understand.
Amazon Customer
I like this book & am planning to start reading it even with the book that am reading now.
Ahmed Ossama
I will recommend this book to anyone in the security field.
gman

Most Helpful Customer Reviews

29 of 29 people found the following review helpful By Ben Rothke on August 6, 2012
Format: Paperback
The first version of Hacking Exposed came out in 1999. The book was a game changer that made penetration and vulnerability testing available to the masses. Needless to say that in the ensuing 13 years, there has been a huge amount of change in the world of information security.

With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic.

The book builds on the fundamentals of the first edition, and does include essentials of hacking on topics such as enumeration, foot printing, scanning, operating system detection and a lot more.

The latest edition gets into current threats and details the new menace of APT (advanced persistent threats), embedded hacking, database hacking, and significant coverage of mobile devices.

The book also spends more time on dealing with countermeasures to the various threats and vulnerabilities detailed.

At over 700 pages, Hacking Exposed 7: Network Security Secrets & Solutions, the book covers every core area of interest to penetration testers.

Written in a lucid and easy to read style, the updated version remains the best book on the topic.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By Amazon Customer on November 18, 2012
Format: Paperback Verified Purchase
Overall an excellent book and easy to understand. I have always loved the Hacking Exposed books. The books are designed to be an organized, easy reference for anyone. The books provide detailed explanation of different types of attacks and then go on to explain the countermeasures for each. It makes a great resource for my CEH preperation.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By Jacob Benz on November 29, 2012
Format: Paperback Verified Purchase
This is a great reference tool. Easy to follow along and understand, even for a network security novice like me.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Greg Turner on April 6, 2013
Format: Paperback Verified Purchase
I have versions 5 and 6 of this book. There wasn't a lot of "NEW" info in my opinion.... Just restated in different ways. Its still one of my favorite titles though.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By S. Lam on March 19, 2014
Format: Paperback Verified Purchase
I'm in vulnerability assessment and pen testing field started last year. I seldom buy computer books these day but this is one of the exceptions.
Company paid $5000 for my SANS 560 course but not willing to spend the money to buy this book so I got it for myself.
I'm still reading it and all I can said is, go get yours.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Jay on March 2, 2014
Format: Paperback
This book has helped me acquire some information that would otherwise be inaccessible for the usual beginner's crowd of programmers. Though much of it I've already learned through my years of reading, the knowledge gained from such a textbook is enormous. They highlight the main points of each topic in computer/information technology and security, and help clarify some real-life scenarios that are more similar to what is happening in our world today. Though there isn't that much information to be an expert in any of these fields, this book proves its meddle by helping mold all of these different dangers and forming it into one easy-to-read textbook.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Skeptical User on January 3, 2013
Format: Paperback Verified Purchase
The book arrived on time and is very informative; it details different hacks and exploits from over ten years ago to the most recent.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Jose Flores on April 22, 2014
Format: Paperback Verified Purchase
I am new to the Security field studying a master and found this book very useful for a Term Project. It is pretty much updated and gave a very good insigth on some of the best hacking techniques.

Jose
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews

Search