By the author's providing a 'hacker' perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. The book [includes]
a good table of contents that is extensive, very organized and thorough
[T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations.
What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses.
Coupled with good illustrations and detailed explanations[,] this is a great resource for both academic and public libraries.
- E-Streams, Vol. 7, No. 9, Sept. 2004
-Anton Chuvakin, Ph.D., GCIA, GCIH, netForensics