Buy new:
$58.90
FREE delivery Thursday, November 21
Ships from: BookCity LLC
Sold by: BookCity LLC
$58.90
FREE delivery Thursday, November 21. Details
Or fastest delivery November 18 - 19. Details
Only 1 left in stock - order soon.
$$58.90 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$58.90
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
BookCity LLC
Ships from
BookCity LLC
Sold by
Sold by
Returns
Returnable until Jan 31, 2025
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Returns
Returnable until Jan 31, 2025
For the 2024 holiday season, eligible items purchased between November 1 and December 31, 2024 can be returned until January 31, 2025.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$2.16
Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc... Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc... See less
$3.98 delivery November 21 - 23. Details
Only 2 left in stock - order soon.
$$58.90 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$58.90
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Ships from and sold by glenthebookseller.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

See all
Something went wrong. Please try your request again later.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition 6th Edition

4.6 4.6 out of 5 stars 44 ratings

There is a newer edition of this item:

Hacking Exposed 7: Network Security Secrets and Solutions
$34.99
(207)
Only 1 left in stock - order soon.
{"desktop_buybox_group_1":[{"displayPrice":"$58.90","priceAmount":58.90,"currencySymbol":"$","integerValue":"58","decimalSeparator":".","fractionalValue":"90","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"ZPo8WD%2BztHgPMi%2BeT16I1aGvKPOx9jmutvjWMi5FD610hhzeA3DR8L1YbhsDbYYqUgu0FoKURAC%2FwNgYivNNzYd2CqhpzWr8B8WdlMuhJYli40kDTScus96tmZ%2Bo6G5sbumQ5H7tT2KSNdry9DwyLnNpo%2B5T9PBFubVIuRrdd6V4%2FV4O%2BCB5DIgxnHq6Rcgb","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$2.16","priceAmount":2.16,"currencySymbol":"$","integerValue":"2","decimalSeparator":".","fractionalValue":"16","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"ZPo8WD%2BztHgPMi%2BeT16I1aGvKPOx9jmuR3M1bmgpvT%2FLN3NInkQMWF9jmDSzyTiSqnsNjHKjQt1e9uLsBdkzFuNzwkKj3FNnhDvzSJ0t6NH81q%2Fb7oeNwtDMN%2FauTP7%2F8NN2k9xUn3WejSz8P0JU%2B47KKhLMTRzm3JFIMqWUOcovvc%2BTaumdnQas3yAMOHgn","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

"For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems

"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company

"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code


Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

About the Author

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.

Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.

George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.

They are the bestselling coauthors of the five previous editions of Hacking Exposed.

Product details

  • Publisher ‏ : ‎ McGraw-Hill Osborne Media; 6th edition (January 5, 2009)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 720 pages
  • ISBN-10 ‏ : ‎ 0071613749
  • ISBN-13 ‏ : ‎ 978-0071613743
  • Item Weight ‏ : ‎ 2.52 pounds
  • Dimensions ‏ : ‎ 7.4 x 1.4 x 9.1 inches
  • Customer Reviews:
    4.6 4.6 out of 5 stars 44 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.6 out of 5 stars
44 global ratings

Customers say

Customers find the book very informative, excellent, and worth reading. They say it provides great explanations without going over an average geek's head. Readers also mention the book provides good security concepts and tips for secure networks.

AI-generated from the text of customer reviews

10 customers mention "Information quality"10 positive0 negative

Customers find the book very informative, excellent, and comprehensive. They say it provides great insight and explanations without going over an average geek's head. Readers also mention the book is written to help novices and guide experts.

"...This book is beyond useful and is written to help the novice and guide the expert...." Read more

"...In the same take, it has some very in-depth practices that will help you understand much of the most recent security practices and attacks that you..." Read more

"...WAS DESIGNED FOR A MORE ADVANCED COMPUTER INDIVIDUAL BUT IT IS AN INTERESTING AND EDUCATIONAL READ." Read more

"...As a Network Engineering student, this book has proven very useful for instructing me as to how to find AND cover up security holes in a system...." Read more

8 customers mention "Readability"8 positive0 negative

Customers find the book great, comprehensive, and educational. They also say it's worth reading.

"...A MORE ADVANCED COMPUTER INDIVIDUAL BUT IT IS AN INTERESTING AND EDUCATIONAL READ." Read more

"This is a very useful and comprehensive book...." Read more

"This book in the series of "hacking exposed" fame is very much worth the time to read in search of the main methods of attacking network security..." Read more

"It's a decent book that gives you a basic idea of where to start. Nothing ground breaking or anything...." Read more

3 customers mention "Security"3 positive0 negative

Customers find the book provides good security concepts, excellent tips for securing your network, and covers everything security-related. They mention it covers everything from Google Hacking to how to pick a physical lock.

"...Everything security-related is covered, from Google Hacking to how to pick a physical lock...." Read more

"...and easy to understand while at the same presenting some very good security concepts...." Read more

"...I recommend this books. It bring to excellent tips for secure your network." Read more

Top reviews from the United States

Reviewed in the United States on October 28, 2011
I normally will sell or trade school books in after the quarter because I have no need for them. This book is beyond useful and is written to help the novice and guide the expert. Half the battle of the cyber war is knowing what the crooks are doing and identifying when it is happening. This book does it all and has been updated to cover most of the recent cracks and hacks at the time of printing. Now don't expect the hack you just received in an email aleart to be covered by name, but the method of which is used will most likely be covered. Every second someone has found a zero day and created some code. You can't stop that, but if you know the method of the attack and countermeasures to stop the hack, you have a fighting chance to protect your system. This book is a keeper for my professional book stash. If the other books in this series are as good as this one, I will buy them all.
Reviewed in the United States on November 30, 2010
Normally I wouldn't take the time and/or effort to write a review about a book. But, this is book is by far the best book I have purchased so far. Throughout the years I have purchased several books (about 5-8 a week) over several years.

Most of the books I have purchased are relating to security and/or programming. This book provides great explanation without going over an average geek's head. In the same take, it has some very in-depth practices that will help you understand much of the most recent security practices and attacks that you need to know.

The biggest pro to this book is that it builds you up to more advanced practices. It starts with foot printing networks then works it way up to exercising current practices. Also, it gives you the impression of thinking on your own.

Due to this book, I have already ordered the rest of the series and am looking forward to it. Any serious security professional needs to read this book.
Reviewed in the United States on November 20, 2012
VERY INFORMATIVE GUIDE. TONS OF INFORMATION BUT OVER THE HEAD OF AN AVERAGE JOE LIKE ME. OBVIOUSLY, THIS BOOK WAS DESIGNED FOR A MORE ADVANCED COMPUTER INDIVIDUAL BUT IT IS AN INTERESTING AND EDUCATIONAL READ.
Reviewed in the United States on October 10, 2011
This book was definitely a surprise when it arrived. It was much larger than I was expecting for the price I paid. Hacking Exposed 6 is a magnificent resource for either a step-by-step learning approach or for use as reference. Everything security-related is covered, from Google Hacking to how to pick a physical lock. As a Network Engineering student, this book has proven very useful for instructing me as to how to find AND cover up security holes in a system.

Excellent resource for either a cover-to-cover read or reference. 5 out of 5!
Reviewed in the United States on May 21, 2012
This is a very useful and comprehensive book. The authors make the information readable and easy to understand while at the same presenting some very good security concepts. Used it for an online class in Risk Management and it helped immensely. I would recommend this any IT security policy creator/manager. The book describes technological threats in detail while at the same time connects to tried and true security concepts.
Reviewed in the United States on March 18, 2012
I have read the past four releases and each version gets better with more and better examples. As the computer and Internet and all the connecting pieces get complicated, all things evolve and so do the tactics in attacks and methods of attack. This book releases a lot of history and a lot of information that a person interested in e-Discovery or forensics would need to get started.
Reviewed in the United States on June 17, 2009
A basic overview of attacks. This book lacks sample code but I suppose it would be OK for someone that just wanted to lightly touch upon different cyber attacks worked. In all honesty, I'd stick to wikipedia.
3 people found this helpful
Report
Reviewed in the United States on January 13, 2012
This book in the series of "hacking exposed" fame is very much worth the time to read in search of the main methods of attacking network security and the methods of securing your network from attack. This book covers quite a bit of ground and offers information on best practices and on tools that are available to evaluate your own network security.

Top reviews from other countries

Translate all reviews to English
Laura
5.0 out of 5 stars Gutes Nachschlagewerk
Reviewed in Germany on February 4, 2018
Das Buch gefällt mir sehr gut, es ist sehr umfangreich und in angenehmer Weise geschrieben. Es enthält viele Übersichten, die ich ganz nützlich finde, wie beispielsweise Portlisten. Kann man guten Gewissens weiterempfehlen.
Fabrizio
5.0 out of 5 stars Molto completo
Reviewed in Italy on May 3, 2018
Il libro e' ottimo e molto completo, spaziando in lungo ed in largo su vari argomenti del tema sicurezza informatica (o come si dice oggi: cyber-security).
Anche se un po' datato e' sicuramente un punto di riferimento molto autorevole sul tema!
Martyncprice
5.0 out of 5 stars Excellent for students
Reviewed in the United Kingdom on November 2, 2012
Absolutely brilliant book for students of network security looking for a view from behind the malicious hackers mind so we can prevent systems from being hacked

-5 stars
Marco
5.0 out of 5 stars Molto interessante
Reviewed in Italy on December 21, 2015
Molto interessante per avere un'idea sulle tecniche di attacco utilizzate. Molte sono datate o non utilizzate, però dà un'idea su quali sono i pericoli da affrontare.
T Stark
4.0 out of 5 stars Good read
Reviewed in the United Kingdom on May 7, 2012
I actually came across this book while in University. It was very interesting alot of excellent examples to go through and try out. Bought to keep in my collection.