- Paperback: 450 pages
- Publisher: Syngress; 1st edition (January 15, 2000)
- Language: English
- ISBN-10: 1928994156
- ISBN-13: 978-1928994152
- Product Dimensions: 9.2 x 7.4 x 1.2 inches
- Shipping Weight: 1.9 pounds
- Average Customer Review: 14 customer reviews
- Amazon Best Sellers Rank: #5,211,065 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hack Proofing Your Network: Internet Tradecraft Paperback – January 15, 2000
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
Too many network administrators depend on the "big sky" principle of network security--they believe that the large number of Internet-connected machines out there will keep black-hat hackers away. Hack Proofing Your Network: Internet Tradecraft points out that statistics are no defense, and that such an attitude is irresponsible. The book shows steps that you can take to harden your resources against attack. Although most of the material in this book isn't up-to-the-minute (how could it be, when the tactics of attackers change daily), you can discourage hackers by implementing the strategies that it describes.
Many antihacking texts assume a fair bit of knowledge, but this one doesn't. Ryan Russell and coauthors explain many terms and concepts, such as traffic sniffing, cryptography, and file differentiation ("diffing"), and the tools that evildoers use to wreak havoc on the systems that they attack--complete with Internet addresses from which you can download them. The book walks you through sample attacks, too, such as hijacking a connection by using a tool called Hunt. Overall, this is a fine introductory-to-intermediate antihacking volume that leads well into more current and advanced resources. You might want to supplement it with two other practical computer-security books: Hacking Exposed catalogues many of the tools that bad guys use, while Network Intrusion Detection helps you analyze security logs and spot attacks in progress. --David Wall
- Modes of attack, and means of defending against them
- Political environment governing software and networking
- Laws and policies springing from that environment
- Approaches to the problem of breaking into systems or denying their services to legitimate users
- Transmission interception
- Several other popular tactics
From the Publisher
Kevin Mitnick's quote on the Hack Proofing cover says it nicely:
Ryan Russell has an important message for us all: "What you don't know *will* hurt you." In his book, "Hack Proofing Your Network: Internet Tradecraft" Ryan reveals the "how to" of systems penetration techniques that intruders may use against you! While "full disclosure" is a two-edged sword, the benefits include forcing software manufacturers to quickly fix security holes and informing potential victims of the vulnerabilities that exist in their infrastructures.Kevin Mitnick
This book brings together some of the most talented IPSec professionals and prominent grey-hat hackers to tell you how to protect your systems from attack. The focus is on the practical and the objective is to leave you with the know-how and tools to deal with virus, session hijacking, client holes, spoofing, and more.
Learn from the best: Mudge, advisor to the WHite House and Congress; Rain Forest Puppy; Elisa Levy, BUGTRAQ moderator; Blue Boar, Vuln-Dev moderator; Dan Effugas Kaminsky, Advanced Network Services division, Cisco Systems; Oliver Friedrichs, Co-founder, SecurityFocus.com; Riley "Caezar" Eller, Senior Security Engineer, Internet Security Advisors; Greg Hoglund, Founder, Click To Secure
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Still a good idea, I keep looking forward for a 'better' second edition.
Note1: The original of this review deserved 21 helpful votes. Unfortunately when I edited it to correct misspellings, Amazon reset the counter :-((
Note2: The second edition is now out (March 2002), and for what I know, it seems to be a very useful and up to date publication. :-))
Having said that, this book covers a lot of ground, and balances the technical details of hacking with the overall picture of what security truly is: a process.
Example-Do you know what a buffer overflow REALLY is? I kind of did, but now I know exactly how it works.
Example2-Why is physical security so important? This is part of the overall process, but it ties directly into the previous example.
My conclusion is that if you work in the field, you should buy the book. This goes for the techie-oriented businessman too, because you'll learn how to cry BS. Not everything you'll read in there will be useful to you, but much of it will be applicable and some things might prevent you from making some really naive decisions (like trusting patches).
There's also chapters devoted to the infamous "security holes" on every computer and how to deal with attacks or viruses. As others have pointed out, this may not be THE DEFINITIVE book on network security, but it does offer a good general approach to it.
The reputation of the authors made me hope for a much more in depth look at hacking techniques. Instead, they touch on most subjects way too lightly, and making several failed attempts in explaining some basic networking concepts.
What I thought to be the most value when reading, was the promise of a website with all the links mentioned in the book. As of today, this site is "under construction" without any useful information at all! ([...])
In short, if you want to get a basic feel for what hacking is about, and want to get it without using a webbrowser, read this book. If you're looking to expand your knowledge or get definate answers, look elsewhere.
Most recent customer reviews
And I like to study somethings new at other country.
I'm also studying about computer study.Read more