Buy new:
-26% $33.37
FREE delivery Wednesday, July 24
Ships from: PEANUT BOOKS
Sold by: PEANUT BOOKS
$33.37 with 26 percent savings
List Price: $44.95

The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
FREE Returns
FREE delivery Wednesday, July 24. Details
Only 1 left in stock - order soon.
$$33.37 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$33.37
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
PEANUT BOOKS
Ships from
PEANUT BOOKS
Sold by
Sold by
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt. You may receive a partial or no refund on used, damaged or materially different returns.
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt. You may receive a partial or no refund on used, damaged or materially different returns.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$8.99
Get Fast, Free Shipping with Amazon Prime FREE Returns
May contain light markings, highlighting or underlining. All pages, cover and binding are clean and intact. Some visible wear. May be missing access codes, supplemental materials, etc. Ships direct from Amazon. May contain light markings, highlighting or underlining. All pages, cover and binding are clean and intact. Some visible wear. May be missing access codes, supplemental materials, etc. Ships direct from Amazon. See less
FREE delivery Thursday, July 18 on orders shipped by Amazon over $35. Order within 17 hrs 56 mins
Only 1 left in stock - order soon.
$$33.37 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$33.37
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Security Warrior: Know Your Enemy 1st Edition

4.1 4.1 out of 5 stars 39 ratings

Save 10% at checkout Shop items
{"desktop_buybox_group_1":[{"displayPrice":"$33.37","priceAmount":33.37,"currencySymbol":"$","integerValue":"33","decimalSeparator":".","fractionalValue":"37","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"nd6pgD%2FCqOOwjYFWTx5%2FC%2FxI7WmtyDmaz9FsGhewTz4V5aXPTpYKYsv%2FwgnPLxCL1uUfRsTCoAynVsKiDY5sMzdgVWkb31eGP0JXo5%2B31ay3pM86yb3LYXqy%2FEMF8wSxAb7i5YZN%2BihEh9vXmB1b4H9cFo4njGDM1U8qE25OltNSF1il%2Blhu876ZtZEdBHeX","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$8.99","priceAmount":8.99,"currencySymbol":"$","integerValue":"8","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"nd6pgD%2FCqOOwjYFWTx5%2FC%2FxI7WmtyDmaQbY8Uf9daSyBp9GK5ZYGnXB88BjOue0r0fRHz44iW%2FGx2scPqzNqOrvUSgq61lKqLNmXi%2BlaU2u6j0z5s3m342HNdgo7%2B0BpB3BybstpV7PJldPamESpD5YckDA4H7VPPpwe7EaHn4dmkPRiEBJRDrPtTSysbHE0","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

About the Author

Dr. Cyrus Peikari is currently the Chief Technical Officer of Airscanner Corporation, a leading mobile security software company. He personally holds several patents in the anti-virus and infosec fields. In addition to numerous radio and television appearances, he is a popular speaker at technology and network security conferences. He has co-authored four bestselling security books, two of them as lead author, including Maximum Wireless Security, Windows .Net Server Security Handbook, and Windows Internet Security.

Product details

  • Publisher ‏ : ‎ O'Reilly Media; 1st edition (February 17, 2004)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 552 pages
  • ISBN-10 ‏ : ‎ 0596005458
  • ISBN-13 ‏ : ‎ 978-0596005450
  • Item Weight ‏ : ‎ 2.07 pounds
  • Dimensions ‏ : ‎ 6.97 x 1.19 x 9.17 inches
  • Customer Reviews:
    4.1 4.1 out of 5 stars 39 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.1 out of 5 stars
4.1 out of 5
39 global ratings

Top reviews from the United States

Reviewed in the United States on March 3, 2004
I've grown tired of books that simply inventory hacking tools. These authors delve deep and explain how things work. Awesome!!
This is an amazing book, covering an incredible amount of ground. I had a little trouble following some of the details on IDA Pro, but the authors were very responsive and helpful. This is the kind of book You'll want to read and re-read. I've got the chapters on software Reversing dog-eared already. The book is very well organized and well worth the investment.
4 people found this helpful
Report
Reviewed in the United States on February 27, 2005
Security Warrior comes with the subject "Know Your Enemy" written across the top of the cover. In those three words, Peikari and Chuvakin give you the reason to read the book. O'Reilly's books are usually of the highest caliber, and happy to say this is shown in Security Warrior. The book is aimed at the security administrator, or the hard core computer person. While much of the book, and of security writing in general, is directed at UNIX systems there is a decent coverage of the Windows environment, which given its track record is in much more need of security warriors.

What the authors do is to give you the why and how of attacks and various threats, showing you some of the tools that can be used in these actions against you. The reader can then take these tools and turn them against the attackers, finding vulnerabilities first, and using other tools to counteract attacks and minimize damage. The first part looks at attacks at software, showing how reverse engineering can find out a lot more than might be planned as to how the program works. Things can get rather technical here but it's a great introduction to the mechanics of reverse engineering software and shows how someone could go looking for vulnerabilities, and finding out maybe not all the hows of the program, at least potential entry points in the software's operation.

Then it is on to OS and network security, with the focus on UNIX and some Windows Systems. The authors give some practical examples to explain what goes into attacks you commonly hear about - SQL Injection and Overflow attacks - but may not have seen demonstrated with examples. Many of the chapters and sections that are written about could and do fill whole books, but the authors do a very good job of balancing going beyond the surface of the topic without going too deeply down the technical details and examples to overwhelm or bore the reader. This is not a light, breeze through book, but a technical reference guide. It's one that I can see returning to again and again to help brush up understanding of certain topics as they are needed. This book is a very good starting point for overviewing the ideas as well as the mechanics of security attacks and to help you learn how to repulse them and become the security warrior. Know thy enemy is the necessity of the modern world.
10 people found this helpful
Report
Reviewed in the United States on March 7, 2009
I found this book to be helpful because it taught me the fundamental security concepts. It gives a good general understanding of the I.T. Security field
2 people found this helpful
Report
Reviewed in the United States on March 12, 2010
This book is an excellent introduction into the world of computer security. I was a bit surprised at the contents; the book features many more offensive techniques, like reverse engineering binaries, performing successful stack/heap overflows, attacks on a variety of server/network platforms, and defeating IDS/forensic technologies. I had initially expected the book to be more focused on security defense, which is covered, but certainly not in a typical ratio. I wouldn't complain though, because as is stated in this book several times, a good offense is a good defense. For instance, upon introducing stack overflows, the authors wisely quip how a company could save a great deal of money and embarrassment if its employees found such vulnerabilities before they leak into the wild.

If I did have one bad thing to say about Security Warrior, it's that I happen to know quite a bit about it's entire first section already, so I found parts quite tiresome. Having already read such texts as Chris Eagle's "The Ida Pro Book", this book's section on disassembly seemed a paltry introduction in comparison; however, it seems this amount would be about right to gently introduce someone to the subject, were they not already aware of this field of computer security knowledge.

All in all, security warrior is a good introductory text to a wide variety of computer security related topics, and hopefully the reader will leave interested in implementing at least a few of the defensive strategies listed, or want to become more familiar with some of the more interesting attack vectors. Further reading/knowledge will be needed other than the information found here in order to do useful security work, but, Security Warrior certainly at least gets the ball rolling and the interest piqued.
Reviewed in the United States on July 27, 2007
This book contains some okay level of steering, but that's about it. The technical accuracy I see exhibited here can only be rivaled by your grandma explaining Windows system internals. It doesn't end at just the author's confusion of C and C++ (classic "strcpy() and other C++ functions" babble); the very explanation of why a program crashes, or how an attack works, or how variables and buffers get created is flat wrong.

I had to stop reading this in the buffer overflow chapter. Highlights include the flawed interpretation of the error message from when bigmac() returned (it returned to non-mapped memory, the book says it read past the end of a string); the horrible explanation of how buffers work (buffers are not simple variables, and variables do not allocate multiple chunks of memory for themselves as explained); and the incorrect description of the return-to-text attack (returned to existing code, but the book says it's run code you injected onto the stack). After reading a stream of these such inaccuracies, I stopped looking for something that actually came out right.

The buffer overflow chapter can easily be replaced with Hacking: The Art of Exploitation. Read that instead. It's also got better networking and WEP attack explanations.
12 people found this helpful
Report

Top reviews from other countries

Kaustubh Nagwekar
5.0 out of 5 stars Liked it
Reviewed in India on June 25, 2019
Too good