To get the free app, enter your email address or mobile phone number.
|New from||Used from|
Michal Zalewski is an internationally recognized information security expert with a long track record of delivering cutting-edge research. He is credited with discovering hundreds of notable security vulnerabilities and frequently appears on lists of the most influential security experts. He is the author of Silence on the Wire (No Starch Press), Google's "Browser Security Handbook," and numerous important research papers.
Great book for a technical intro to computer security. It covers a broad set of topics and gets to key fundamentals that help the reader start to think about the key things that... Read morePublished 10 months ago by Thomas M. Kroeger
The author has made considerable effort to explain his points quite eloquently and in great detail, though a technical book there is quite some artistry about how its written.Published 21 months ago by Keith Makan
Zalewski "teaches you to fish" so that you walk away with an understanding of how to think about information security. Read morePublished on September 13, 2013 by Blaise Pabon
This is a legacy... but wonderful book. There is nothing more that needs to be said, buy it.. end of story.Published on August 16, 2013 by Tim
This book was an eye-opener into a world of sophisticated attacks and reconnaissance that seem like they belong more to an over-the-top Hollywood plot than real life. Read morePublished on February 11, 2012 by Jordan Grotepas
Before I bought this book I had seen some of Zalewski's work: his museum of broken packets and his famous Mozilla Firefox vulnerability reports. Read morePublished on April 6, 2009 by L. Garcia
Never trust a person that writes about things that he or she does not understand.
The citation below contains several very serious errors. Read more
A must for any IT security/networking engineer. Great read, great price, informative yet entertaining.Published on July 23, 2008 by Angeli's Mom
Zalewski brought up a number of interesting and very innovative security situations and possibilities. Read morePublished on February 6, 2008 by Charles G. Heaton