Programming Books C Java PHP Python Learn more Browse Programming Books
Hacking Exposed 7: Network Security Secrets & Solutions and over one million other books are available for Amazon Kindle. Learn more

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
Sell Us Your Item
For a $11.99 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Start reading Hacking Exposed 7: Network Security Secrets & Solutions on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Hacking Exposed 7: Network Security Secrets & Solutions [Paperback]

by Stuart McClure, Joel Scambray, George Kurtz
4.6 out of 5 stars  See all reviews (33 customer reviews)

Buy New
$29.00 & FREE Shipping on orders over $35. Details
Rent
$17.59
In Stock.
Ships from and sold by Amazon.com. Gift-wrap available.
In Stock.
Rented by RentU and Fulfilled by Amazon.
Want it Monday, April 28? Choose Two-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Kindle Edition $25.00  
Paperback $29.00  
Sell Us Your Books
Get up to 80% back when you sell us your books, even if you didn't buy them at Amazon. Learn more

Book Description

July 11, 2012 0071780289 978-0071780285 7

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself

Frequently Bought Together

Hacking Exposed 7: Network Security Secrets & Solutions + The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy + Hacking: The Art of Exploitation, 2nd Edition
Price for all three: $77.43

Buy the selected items together


Editorial Reviews

About the Author

Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004.

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.


Product Details

  • Series: Hacking Exposed
  • Paperback: 768 pages
  • Publisher: McGraw-Hill Osborne Media; 7 edition (July 11, 2012)
  • Language: English
  • ISBN-10: 0071780289
  • ISBN-13: 978-0071780285
  • Product Dimensions: 9.2 x 7.3 x 1.7 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (33 customer reviews)
  • Amazon Best Sellers Rank: #19,303 in Books (See Top 100 in Books)

Customer Reviews

4.6 out of 5 stars
(33)
4.6 out of 5 stars
Most Helpful Customer Reviews
26 of 26 people found the following review helpful
5.0 out of 5 stars Version 7 of the classic reference on the topic August 6, 2012
Format:Paperback
The first version of Hacking Exposed came out in 1999. The book was a game changer that made penetration and vulnerability testing available to the masses. Needless to say that in the ensuing 13 years, there has been a huge amount of change in the world of information security.

With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic.

The book builds on the fundamentals of the first edition, and does include essentials of hacking on topics such as enumeration, foot printing, scanning, operating system detection and a lot more.

The latest edition gets into current threats and details the new menace of APT (advanced persistent threats), embedded hacking, database hacking, and significant coverage of mobile devices.

The book also spends more time on dealing with countermeasures to the various threats and vulnerabilities detailed.

At over 700 pages, Hacking Exposed 7: Network Security Secrets & Solutions, the book covers every core area of interest to penetration testers.

Written in a lucid and easy to read style, the updated version remains the best book on the topic.
Was this review helpful to you?
7 of 7 people found the following review helpful
5.0 out of 5 stars Great book! November 18, 2012
Format:Paperback|Verified Purchase
Overall an excellent book and easy to understand. I have always loved the Hacking Exposed books. The books are designed to be an organized, easy reference for anyone. The books provide detailed explanation of different types of attacks and then go on to explain the countermeasures for each. It makes a great resource for my CEH preperation.
Comment | 
Was this review helpful to you?
6 of 6 people found the following review helpful
5.0 out of 5 stars Very Informative November 29, 2012
Format:Paperback|Verified Purchase
This is a great reference tool. Easy to follow along and understand, even for a network security novice like me.
Comment | 
Was this review helpful to you?
4 of 4 people found the following review helpful
3.0 out of 5 stars A lot of regurgitated info April 6, 2013
Format:Paperback|Verified Purchase
I have versions 5 and 6 of this book. There wasn't a lot of "NEW" info in my opinion.... Just restated in different ways. Its still one of my favorite titles though.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
5.0 out of 5 stars Must read March 19, 2014
By S. Lam
Format:Paperback|Verified Purchase
I'm in vulnerability assessment and pen testing field started last year. I seldom buy computer books these day but this is one of the exceptions.
Company paid $5000 for my SANS 560 course but not willing to spend the money to buy this book so I got it for myself.
I'm still reading it and all I can said is, go get yours.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
By Jay
Format:Paperback
This book has helped me acquire some information that would otherwise be inaccessible for the usual beginner's crowd of programmers. Though much of it I've already learned through my years of reading, the knowledge gained from such a textbook is enormous. They highlight the main points of each topic in computer/information technology and security, and help clarify some real-life scenarios that are more similar to what is happening in our world today. Though there isn't that much information to be an expert in any of these fields, this book proves its meddle by helping mold all of these different dangers and forming it into one easy-to-read textbook.
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
4.0 out of 5 stars Very informative! January 3, 2013
Format:Paperback|Verified Purchase
The book arrived on time and is very informative; it details different hacks and exploits from over ten years ago to the most recent.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Library must-have. January 29, 2014
Format:Kindle Edition|Verified Purchase
The Hacking Exposed books have become a staple of any pentester's core library. Each new edition is both relevant and up to date, making it an easy read.
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
5.0 out of 5 stars Really an updated book!
I am new to the Security field studying a master and found this book very useful for a Term Project. Read more
Published 2 days ago by Jose Flores
4.0 out of 5 stars Favorite book!
Hacking Exposed 7: Network Security Secrets & Solutions was the first book of the series Hacking Exposed that I read. Read more
Published 1 month ago by Mario Acosta
5.0 out of 5 stars Excellent book
Got this for my son who is getting more into computer programming and wants to learn. It has a great reputation and really talks about securing computer systems and networks. Read more
Published 2 months ago by David Kalish
4.0 out of 5 stars Security for professionals
Well. I read the book. It is designed for the professional and is quite technical. I had difficulty reading the book but I would recommend to any security professional. Read more
Published 2 months ago by Richard knutson
5.0 out of 5 stars Great
It is a great book to read even ir you dont read the bits and bytes exposed as examples you will learn a lot
Published 2 months ago by Marcelo
4.0 out of 5 stars Unafortundely out of date
I noticed this kind of books always the content become obsolete material faster than others, but it still holds the basic theorical concepts than another books you can't learn... Read more
Published 3 months ago by Ricardo Carrillo Sánchez
5.0 out of 5 stars the best there is
the best there is in learning how hacks happen, and what can be done to mitigate them. This should be required reading for anyone in IT.
Published 4 months ago by davidh
5.0 out of 5 stars Great book
Covers some important material you may not always see anywhere else. This book is a helpful reference to go getters involved in network security, and I found the topics discussed... Read more
Published 6 months ago by Darren Vickers
5.0 out of 5 stars Reference Material
This is one of the greatess books put together to aid in my presue of greatness. It is truly put together well
Published 6 months ago by The Cameraman
4.0 out of 5 stars Not a security expert, but found it useful
This is a pretty good book to get a good handle. I enjoyed reading the mobile Android vs. iPhone and their security vulnerabilities
Published 6 months ago by BostonSox
Search Customer Reviews
Only search this product's reviews
ARRAY(0xa44cf42c)

What Other Items Do Customers Buy After Viewing This Item?


Forums

Have something you'd like to share about this product?
Start a new discussion
Topic:
First post:
Prompts for sign-in
 


Search Customer Discussions
Search all Amazon discussions


Look for Similar Items by Category


Want to discover more products? You may find many from antivirus for smartphones shopping list.