Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition 6th Edition

4.6 out of 5 stars 29 customer reviews
ISBN-13: 978-0071613743
ISBN-10: 0071613749
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$6.25
Condition: Used: Very Good
Comment: Pages are clean with no markings. Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35.
Access codes and supplements are not guaranteed with used items.
54 Used from $0.01
FREE Shipping on orders over $25.
More Buying Choices
17 New from $5.98 54 Used from $0.01

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Windows10ForDummiesVideo
Windows 10 For Dummies Video Training
Get up to speed with Windows 10 with this video training course from For Dummies. Learn more.
click to open popover

Editorial Reviews

About the Author

Stuart McClure, CISSP, CNE, CCSE, a leading authority on information security, is VP of Operations & Strategy for the Risk & Compliance Business Unit at McAfee.

Joel Scambray, CISSP, is cofounder and CEO of Consciere, provider of strategic security advisory services.

George Kurtz, CISSP, CISA, CPA, is an internationally recognized security expert, author, and entrepreneur. He is currently a senior executive and general manager with McAfee, Inc.

They are the bestselling coauthors of the five previous editions of Hacking Exposed.

NO_CONTENT_IN_FEATURE

The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 720 pages
  • Publisher: McGraw-Hill Osborne Media; 6 edition (January 5, 2009)
  • Language: English
  • ISBN-10: 0071613749
  • ISBN-13: 978-0071613743
  • Product Dimensions: 7.4 x 1.4 x 9.1 inches
  • Shipping Weight: 2.6 pounds
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (29 customer reviews)
  • Amazon Best Sellers Rank: #1,053,480 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Viken Derderian on June 19, 2009
Format: Kindle Edition
My first exposure with hacking series was back in 2002 the 2nd edition, in the Foreword of the 2nd edition they summed up the expectation and identified the who should read this book "...But if a computer network has a security vulnerability and no one knows about it, is it insecure?".
In writing this review I like to bring to attention the fact that I am not sure who is the intended audience anymore.
I have seen this book on every network engineer's and self proclaimed security guru's book shelf, many of the one's I have seen were not even used once.
So my question is why do people keep on buying this book, is it the title? The marketing? Or is it a cult think? I was given the 6th edition as a gift. I read most of it out of curiosity, and after a while I realized that this book does not have a true audience.

This book is not written for;
.-The hacker since many of the hacking techniques are either irrelevant or old and most hackers know a better way.
.-The criminal. See previous note.
.-An auditor. If it was, it would have specific processes on how to conduct and audit.
.-Management, they don't care how hping2 works.
.-Those who are concerned about wireless security. There is a "hacking exposed for wireless" book for them.

If we take away the fat, this book has about 200 pages of useful information, most of which can be found using the authors favorite search engine Google
why did I give it a 2 star instead of just 1, I did like the entire 10th Chapter, this section has very relevant information, and it has a purpose, it introduces the concept of governance and use of standards such as ISO17799 which is actually ISO27001:2005 and NIST Publications 800-64 and 800-27. It explains the SDLC although the author calls it SDL combining the Life with Cycle. So if this is your First Hacking Exposed book, buy it with caution, but if you already have one, don't "upgrade".
Best Fishes and thank you for reading.
4 Comments 61 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
I have read the past four releases and each version gets better with more and better examples. As the computer and Internet and all the connecting pieces get complicated, all things evolve and so do the tactics in attacks and methods of attack. This book releases a lot of history and a lot of information that a person interested in e-Discovery or forensics would need to get started.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This is a very useful and comprehensive book. The authors make the information readable and easy to understand while at the same presenting some very good security concepts. Used it for an online class in Risk Management and it helped immensely. I would recommend this any IT security policy creator/manager. The book describes technological threats in detail while at the same time connects to tried and true security concepts.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
VERY INFORMATIVE GUIDE. TONS OF INFORMATION BUT OVER THE HEAD OF AN AVERAGE JOE LIKE ME. OBVIOUSLY, THIS BOOK WAS DESIGNED FOR A MORE ADVANCED COMPUTER INDIVIDUAL BUT IT IS AN INTERESTING AND EDUCATIONAL READ.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
George Kurtz, Stuart McClure and Joel Scambray have been a staple of my Information Security library since the first Hacking Exposed book. Things change quickly in the security world and the authors of Hacking Exposed 6: Network Security Secrets & Solutions have done a tremendous job at taking a great thing and making it better by updating it with new attacks and countermeasures.

Kurtz, McClure, and Scambray have maintained the core of what makes Hacking Exposed indispensible and they have once again added to and updated the information to keep the book current with the latest attacks, exploits and hacker techniques.

The basic format of the book remains the same. The beginning covers footprinting, scanning and enumeration to identify potential target systems. It then moves on to a section regarding system hacking, divided into Windows and Unix sections, then into Infrastructure Hacking with sections on Remote Connectivity or VoIP hacking, Network Devices, Wireless Hacking, and Hacking Hardware.

The appendices list commonly used TCP and UDP ports and the services that use them as well as providing a graphic representation of the Top 14 Security Vulnerabilities.

There are a handful of books that should be "must-reads" for anyone responsible for computer or network security and this is one of them. Learning the information in this book will help you learn current attacks and hacking techniques and develop effective countermeasures to protect your network. Hands down, Hacking Exposed 6 should be on every network or security administrator's desk for quick reference.

Buy this book. Even if you already have a previous edition, the new and updated information in this book are worth the investment.
Comment 17 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Good book, giving a big overview of the hacking scene. Mainly focused on old-school hacking(networking), it's a good read before attacking the other books of the series (Hacking Windows Exposed, Hacking Linux Exposed, etc), it will give you a introduction to those more focused readings. Maybe on some chapters, the authors abuse the list of tools, not paying much attention to the concept behind, but in a general way its well balanced. I face this book like a reference and all the security people should have it on their bookshelves.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I normally will sell or trade school books in after the quarter because I have no need for them. This book is beyond useful and is written to help the novice and guide the expert. Half the battle of the cyber war is knowing what the crooks are doing and identifying when it is happening. This book does it all and has been updated to cover most of the recent cracks and hacks at the time of printing. Now don't expect the hack you just received in an email aleart to be covered by name, but the method of which is used will most likely be covered. Every second someone has found a zero day and created some code. You can't stop that, but if you know the method of the attack and countermeasures to stop the hack, you have a fighting chance to protect your system. This book is a keeper for my professional book stash. If the other books in this series are as good as this one, I will buy them all.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Pages with Related Products. See and discover other items: computer security