Industrial-Sized Deals TextBTS15 Shop Women's Handbags Learn more nav_sap_plcc_6M_fly_beacon Beach House $5 Off Fire TV Stick Subscribe & Save Shop Popular Services pivdl pivdl pivdl  Amazon Echo Starting at $99 Kindle Voyage Nintendo Digital Games Big Savings in the Amazon Fall Sportsman Event STEM Toys & Games

Hacking Exposed 7: Network Security Secrets and Solutions 7th Edition

49 customer reviews
ISBN-13: 978-0071780285
ISBN-10: 0071780289
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $6.50
Learn More
Trade in now
Have one to sell? Sell on Amazon
Try the eTextbook for free
$0.00
Rent
$9.99
Buy used
$21.43
Buy new
$26.11
More Buying Choices
31 New from $26.11 35 Used from $15.47
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Textbooks
$26.11 FREE Shipping on orders over $35. In stock on September 6, 2015. Order it now. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Hacking Exposed 7: Network Security Secrets and Solutions + The Hacker Playbook: Practical Guide To Penetration Testing + Rtfm: Red Team Field Manual
Price for all three: $57.37

Some of these items ship sooner than the others.

Buy the selected items together

Editorial Reviews

About the Author

Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004.

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

NO_CONTENT_IN_FEATURE

Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Series: Hacking Exposed
  • Paperback: 768 pages
  • Publisher: McGraw-Hill Education; 7 edition (August 1, 2012)
  • Language: English
  • ISBN-10: 0071780289
  • ISBN-13: 978-0071780285
  • Product Dimensions: 7.4 x 1.5 x 9.1 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (49 customer reviews)
  • Amazon Best Sellers Rank: #25,728 in Books (See Top 100 in Books)

Customer Reviews

Most Helpful Customer Reviews

33 of 33 people found the following review helpful By Ben Rothke on August 6, 2012
Format: Paperback
The first version of Hacking Exposed came out in 1999. The book was a game changer that made penetration and vulnerability testing available to the masses. Needless to say that in the ensuing 13 years, there has been a huge amount of change in the world of information security.

With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic.

The book builds on the fundamentals of the first edition, and does include essentials of hacking on topics such as enumeration, foot printing, scanning, operating system detection and a lot more.

The latest edition gets into current threats and details the new menace of APT (advanced persistent threats), embedded hacking, database hacking, and significant coverage of mobile devices.

The book also spends more time on dealing with countermeasures to the various threats and vulnerabilities detailed.

At over 700 pages, Hacking Exposed 7: Network Security Secrets & Solutions, the book covers every core area of interest to penetration testers.

Written in a lucid and easy to read style, the updated version remains the best book on the topic.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Amazon Customer on November 18, 2012
Format: Paperback Verified Purchase
Overall an excellent book and easy to understand. I have always loved the Hacking Exposed books. The books are designed to be an organized, easy reference for anyone. The books provide detailed explanation of different types of attacks and then go on to explain the countermeasures for each. It makes a great resource for my CEH preperation.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Jacob Benz on November 29, 2012
Format: Paperback Verified Purchase
This is a great reference tool. Easy to follow along and understand, even for a network security novice like me.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By S. Lam on March 19, 2014
Format: Paperback Verified Purchase
I'm in vulnerability assessment and pen testing field started last year. I seldom buy computer books these day but this is one of the exceptions.
Company paid $5000 for my SANS 560 course but not willing to spend the money to buy this book so I got it for myself.
I'm still reading it and all I can said is, go get yours.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By Greg Turner on April 6, 2013
Format: Paperback Verified Purchase
I have versions 5 and 6 of this book. There wasn't a lot of "NEW" info in my opinion.... Just restated in different ways. Its still one of my favorite titles though.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Jose Flores on April 22, 2014
Format: Paperback Verified Purchase
I am new to the Security field studying a master and found this book very useful for a Term Project. It is pretty much updated and gave a very good insigth on some of the best hacking techniques.

Jose
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Skeptical User on January 3, 2013
Format: Paperback Verified Purchase
The book arrived on time and is very informative; it details different hacks and exploits from over ten years ago to the most recent.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Chris Ream on January 29, 2014
Format: Kindle Edition Verified Purchase
The Hacking Exposed books have become a staple of any pentester's core library. Each new edition is both relevant and up to date, making it an easy read.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Want to discover more products? Check out these pages to see more: standard push pins, asus org, sharing network, the mac hacker’s handbook, active directory, gmail login