Buy New
$36.77
Qty:1
  • List Price: $49.95
  • Save: $13.18 (26%)
In stock but may require an extra 1-2 days to process.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $1.06
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts Paperback – October 21, 2009


Amazon Price New from Used from
Paperback
"Please retry"
$36.77
$30.93 $24.94


NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 214 pages
  • Publisher: Dr. Ali Jahangiri; 1st edition (October 21, 2009)
  • Language: English
  • ISBN-10: 0984271503
  • ISBN-13: 978-0984271504
  • Product Dimensions: 0.5 x 8.9 x 5.9 inches
  • Shipping Weight: 10.6 ounces (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (13 customer reviews)
  • Amazon Best Sellers Rank: #1,728,696 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Dr. Ali Jahangiri (Sc.D, CITP MBCS, LPT, CEH, CHFI, ECSA, CEI, ISMS Lead Auditor, Security+, CIW Security Analyst, MCSE: Security, MBCS, MCSA, MCDBA, CCNA, A+) is the technical director of Secure 1st, a firm that specializes in delivering practical information security and cyber forensic solutions. He has an extensive background in computer science and has worked as an information security auditor, security consultant and technical trainer, gaining experience and reaching achievements across the whole spectrum of technical and management aspects of Information Technology, Information Security, Business Continuity, Networking and Systems Integration and physical security in Information and Communications Technology (ICT) companies. Dr. Jahangiri conducts more than 1,000 hours training per year in the various subjects in information security and cyber forensics. He also has registered and pending patents in the area of network security and cyber forensics with many published papers in international journals. He is a Chartered IT Professional member of the British Computer Society, and a professional member of both the IEEE and the Information Systems Audit and Control Association. Dr. Jahangiri has been selected for the Instructor Circle of Excellence Award in 2009 by EC-Council for his Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigation (CHFI) workshops. Further, he has been selected as a computer scientist from 60,000 other leaders from industries and from 215 countries and territories for the 2010 edition of Marquis Who's Who in the World. His vast professional experience and academic activities are the keys to his success.

More About the Author

Dr. Ali Jahangiri (Sc.D, CITP MBCS, LPT, CEH, CHFI, ECSA, CEI, ISMS Lead Auditor, Security+, CIW Security Analyst, MCSE: Security, MBCS, MCSA, MCDBA, CCNA, A+) is the technical director of Secure 1st, a firm that specializes in delivering practical information security and cyber forensic solutions. He has an extensive background in computer science and has worked as an information security auditor, security consultant and technical trainer, gaining experience and reaching achievements across the whole spectrum of technical and management aspects of Information Technology, Information Security, Business Continuity, Networking and Systems Integration and physical security in Information and Communications Technology (ICT) companies.

Dr. Jahangiri conducts more than 1,000 hours training per year in the various subjects in information security and cyber forensics. He also has registered and pending patents in the area of network security and cyber forensics with many published papers in international journals. He is a Chartered IT Professional member of the British Computer Society, and a professional member of both the IEEE and the Information Systems Audit and Control Association.

Dr. Jahangiri has been selected for the Instructor Circle of Excellence Award in 2009 by EC-Council for his Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigation (CHFI) workshops. Further, he has been selected as a computer scientist from 60,000 other leaders from industries and from 215 countries and territories for the 2010 edition of Marquis Who's Who in the World. His vast professional experience and academic activities are the keys to his success.

Customer Reviews

If you study all the tools the writer says you will become a good hacker, hope white hat.
Juan Garcia Cuesta
There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them.
Evelio Tarazona
It doesn't matter if you are a security novice or a professional IT expert with security training this book will have something for you.
Mr. G. D. Sims

Most Helpful Customer Reviews

4 of 5 people found the following review helpful By MGMcd on December 9, 2009
Format: Paperback Verified Purchase
It is clear that English is not the first language of the author, so some of the writing is in the idiom and grammar of his first language. It could have profited from an English editor, but the level of writing does not take any of the value from the book. I think we are all used to working with talented people who express themselves more fluently in another language, but that doesn't prevent us from appreciating the value of their work.

Here the work is an excellent and perspicacious primer at the script kiddie level for those new to hacking, but with a solid background in application and system architecture. It is an eye opener for those not otherwise engaged in security, and an entree to those interested in moving into penetration and security testing.

There are a good deal of references to outside utilities to start to build one's toolkit for all sorts of nefarious activities. There is little if any tutorial on how to use any of the tools, or how to glean the significance of the data being presented by the tool, but if the reader has the proper background, there will be a lot of forehead smacking when you see what these tools can reveal and exploit when used properly.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Juan Esteban Garcia Estrada on April 6, 2010
Format: Paperback
The book contains useful information, specially for people like me, beginning in this area. Recommended.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Tactical Keychains on July 12, 2014
Format: Paperback Verified Purchase
Decent book, fun to read.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By LuckyDay4Me! on April 23, 2014
Format: Paperback Verified Purchase
Gives you a good intro on what to expect in the real world. If you are new to security its definitely something to read on.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them. Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network. Hands down, Live Hacking should be on every network or security administrator's desk for quick reference.

When I first heard about Dr. Ali Jahangiri's book, the title immediately caught my attention. Things change quickly in the security world and the author of the book, have done a tremendous job at making a great thing by taking the new attacks techniques and countermeasures.

Even if you already have experience in the security field, the new and updated information in this book are worth the investment.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
Hi,

The book is lacking detail on more on how an attacker initiates an attack. However, I found the book a great overview of product out there for Windows /Linux users.

If you are looking for a book to let you know how attackers get into you network - then this is the book for you. It might be a bit over the top for a novice users, more for an intermediate linux user , or advanced linux users.

cheers
Carlo S
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Juan Garcia Cuesta on December 23, 2009
Format: Paperback Verified Purchase
Really good for reading, easy and short messages. If you study all the tools the writer says you will become a good hacker, hope white hat.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search