Automotive Holiday Deals GG Shop Men's Athletic Shoes Learn more nav_sap_plcc_6M_fly_beacon Adele egg_2015 All-New Amazon Fire TV Grocery Martha Stewart American Made Amazon Gift Card Offer minions minions minions  Amazon Echo Starting at $84.99 Kindle Black Friday Deals BestoftheYear Shop Now Tikes
Network Security Hacks and over one million other books are available for Amazon Kindle. Learn more

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

  • List Price: $39.99
  • Save: $9.00 (23%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Gift-wrap available.
Network Security Hacks has been added to your Cart
Condition: Used: Very Good
Comment: All the pages and cover are intact, Pages appear to be clean
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Security Hacks Paperback – November 6, 2006

23 customer reviews

See all 4 formats and editions Hide other formats and editions
New from Used from
"Please retry"
"Please retry"
$19.52 $0.68

Best Books of the Year So Far
Looking for something great to read? Browse our editors' picks for 2015's Best Books of the Year in fiction, nonfiction, mysteries, children's books, and much more.
$30.99 FREE Shipping on orders over $35. In Stock. Ships from and sold by Gift-wrap available.

Frequently Bought Together

  • Network Security Hacks
  • +
  • Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
  • +
  • Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting
Total price: $82.77
Buy the selected items together

Editorial Reviews

Book Description

Tips & Tools for Protecting Your Privacy

About the Author

Andrew Lockhart is originally from South Carolina, but currently resides in northern Colorado where he spends his time trying to learn the black art of auditing disassembled binaries and trying to keep from freezing to death. He holds a BS in computer science from Colorado State University and has done security consulting for small businesses in the area. He currently works at a Fortune 100 company when not writing. In his free time he works on Snort-Wireless, a project intended to add wireless intrusion detection popular OpenSource IDS Snort.


Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Paperback: 480 pages
  • Publisher: O'Reilly Media; Second Edition edition (November 9, 2006)
  • Language: English
  • ISBN-10: 0596527632
  • ISBN-13: 978-0596527631
  • Product Dimensions: 6 x 1.1 x 9 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (23 customer reviews)
  • Amazon Best Sellers Rank: #938,322 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

24 of 25 people found the following review helpful By Richard Bejtlich on June 30, 2004
Format: Paperback
"Network Security Hacks" (NSH) has something for nearly everyone, although it focuses squarely on Linux, BSD, and Windows, in that order of preference. Administrators for commercial UNIX variants (Solaris, AIX, HP-UX, etc.) should be able to apply much of the book's advice to their environments, but they are not the target audience. NSH is written for admins needing quick-start guides for common security tools, and in this respect it delivers.
I found NSH to be most rewarding when it avoided discussing the same topics everyone else has covered. Lesser known tools like authpf, ftester, sniffdet, SFS, rpcapd, and Sguil caught my interest (especially as I write Sguil installation docs). Even some ways to use familiar tools were helpful, like the -f (fork) and -N (no command) switches for SSH forwarding. In some cases it made sense to mention well-worn topics like BIND or MySQL, with an eye towards quickly augmenting the security of those servers.
Elsewhere I questioned the need to cover certain tools. With the number of Snort titles approaching double digits, and O'Reilly's own Snort books in the wings, was it really necessary to devote several hacks to Snort? In the same respect, I felt mention of Nmap, Nessus, swatch, and ACID was not needed, nor was advice on implementing certain Windows security features.
In some cases the descriptions were too brief to really explain the technologies at hand. For example, the "Secure Tunnels" chapter discusses a very specific IPSec scenario (wireless client to gateway) without informing the reader of the other sorts of tunnels that are possible. I also questioned some of the content, like p. 47's statement that Windows lacks "robust built-in scripting.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
36 of 40 people found the following review helpful By Jack D. Herrington on July 28, 2004
Format: Paperback
It's important to understand who this book is for. It's not for the amateur looking to configure their firewall. The book starts with locking up UNIX filesystems and doesn't turn back the complexity clock as it winds through all the way to advanced topics like Honeypots and various SSH tunneling schemes. I highly recommend this book for network administrators and security professionals looking to make sure they have all of their bases covered. However, for the personal computer user looking to make sure their DSL doesn't get hacked I cannot recommend this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
14 of 15 people found the following review helpful By swallbridge on September 8, 2004
Format: Paperback
This book took me a long time to read, but for a good reason, I kept implementing

the various hacks in the book on a server I had started setting up.

The book is mostly Unix related, but there is some Windows related `hacks' as well.

I think the Windows coverage was lacking a bit though. For Unix, it talks about

Linux, the BSD's and a bit on Mac OS X and Solaris. Most of the topics are

general enough to apply to any Unix based Operating System, but some are specific

to an operating system.

One of the great things about the Hacks series of books by O'Reilly is that the

information is presented in nice small chunks that you can read in a few minutes

if you have some spare time.

The hacks are all `hyperlinked' to each other, if a hack mentions something that

relates to another hack, it is highlighted in blue and the hack that it

references is listed. I did find a few places where this wasn't done

(#84 Real-Time Monitoring, first mentions Barnyard but doesn't provide any

information on it or mention that it is one of the later hacks).

Lots of the hacks in the book could be found by doing some reading on the

internet, but finding such a variety of topics all in one place, with enough

information to get you started is really nice. Even though I consider myself to

be fairly security conscious, I still found quite a few things in this book that

I hadn't thought of, or plain didn't realize were possible or even existed. I

would recommend this book to anyone that is interested in security or anyone

responsible for maintaining a server (whether or not it is on the internet).
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
15 of 17 people found the following review helpful By Joaquin Menchaca on July 31, 2004
Format: Paperback
Overall, I find this book to be an enjoyable read. I thumb through it time and time again, and come up with some useful hints and tips (not really necessarily hacks though). It's more oriented toward BSD Unix and Linux, but I did find some useful hints for Windows (the current topic of my studies). I really like the plug for ntsyslod (hack 56), which can take binary event logs and route them to syslogd service. Nice. Finally, logs in Windows are now open for business.

I found some material to be trivial, making problems from non-problems, or rather not practical to implement. For example, one hint advises Windows users to encrypt their temp directory (hack 28). However, there are easy workarounds to bypass EFS, and the temp directory is within a user's profile, and thus secured from other users anyhow. So encrypting it is unecessary, and not useful given users can drag a file to a floppy or non-NTFS filesystem to and bypass the encryption.

One hack recommended flush the page file as some important application data might be in there (hack 29). However, this requires delving into the registry, and to implement across all workstations is too taxing. However, there could be ways to automate this through group policy objects and scripts. There's no coverage on how to automate some of these chores, which is not always straightforward in Windows.

One a final note, I wish there was more coverage of Windows. There's could be equivelent coverage of things like time sychronization (hack 44) for Windows as well.

Overall though, I think there are enough useful tips to make this book valuable. I've already wrote my name on this one...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Network Security Hacks
This item: Network Security Hacks
Price: $30.99
Ships from and sold by

Want to discover more products? Check out this page to see more: computer security