Buy new:
-26% $33.37$33.37
FREE delivery Wednesday, July 24
Ships from: PEANUT BOOKS Sold by: PEANUT BOOKS
Save with Used - Good
$8.99$8.99
Ships from: Amazon Sold by: Green Gem Books
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Security Warrior: Know Your Enemy 1st Edition
Purchase options and add-ons
- ISBN-100596005458
- ISBN-13978-0596005450
- Edition1st
- PublisherO'Reilly Media
- Publication dateFebruary 17, 2004
- LanguageEnglish
- Dimensions6.97 x 1.19 x 9.17 inches
- Print length552 pages
Popular titles by this author
Editorial Reviews
About the Author
Product details
- Publisher : O'Reilly Media; 1st edition (February 17, 2004)
- Language : English
- Paperback : 552 pages
- ISBN-10 : 0596005458
- ISBN-13 : 978-0596005450
- Item Weight : 2.07 pounds
- Dimensions : 6.97 x 1.19 x 9.17 inches
- Best Sellers Rank: #2,805,290 in Books (See Top 100 in Books)
- #220 in Intranets & Extranets
- #340 in CompTIA Certification Guides
- #610 in Computer Viruses
- Customer Reviews:
About the authors

Dr. Anton Chuvakin (http://www.chuvakin.org/) is a Research Director at Gartner's Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management" and "PCI Compliance" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blog "Security Warrior" was one of the most popular in the industry.
In addition, Anton taught classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He worked on emerging security standards and served on advisory boards of several security start-ups.
Most recently, Anton was running his own security consulting practice, focusing on logging, SIEM and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
This is an amazing book, covering an incredible amount of ground. I had a little trouble following some of the details on IDA Pro, but the authors were very responsive and helpful. This is the kind of book You'll want to read and re-read. I've got the chapters on software Reversing dog-eared already. The book is very well organized and well worth the investment.
What the authors do is to give you the why and how of attacks and various threats, showing you some of the tools that can be used in these actions against you. The reader can then take these tools and turn them against the attackers, finding vulnerabilities first, and using other tools to counteract attacks and minimize damage. The first part looks at attacks at software, showing how reverse engineering can find out a lot more than might be planned as to how the program works. Things can get rather technical here but it's a great introduction to the mechanics of reverse engineering software and shows how someone could go looking for vulnerabilities, and finding out maybe not all the hows of the program, at least potential entry points in the software's operation.
Then it is on to OS and network security, with the focus on UNIX and some Windows Systems. The authors give some practical examples to explain what goes into attacks you commonly hear about - SQL Injection and Overflow attacks - but may not have seen demonstrated with examples. Many of the chapters and sections that are written about could and do fill whole books, but the authors do a very good job of balancing going beyond the surface of the topic without going too deeply down the technical details and examples to overwhelm or bore the reader. This is not a light, breeze through book, but a technical reference guide. It's one that I can see returning to again and again to help brush up understanding of certain topics as they are needed. This book is a very good starting point for overviewing the ideas as well as the mechanics of security attacks and to help you learn how to repulse them and become the security warrior. Know thy enemy is the necessity of the modern world.
If I did have one bad thing to say about Security Warrior, it's that I happen to know quite a bit about it's entire first section already, so I found parts quite tiresome. Having already read such texts as Chris Eagle's "The Ida Pro Book", this book's section on disassembly seemed a paltry introduction in comparison; however, it seems this amount would be about right to gently introduce someone to the subject, were they not already aware of this field of computer security knowledge.
All in all, security warrior is a good introductory text to a wide variety of computer security related topics, and hopefully the reader will leave interested in implementing at least a few of the defensive strategies listed, or want to become more familiar with some of the more interesting attack vectors. Further reading/knowledge will be needed other than the information found here in order to do useful security work, but, Security Warrior certainly at least gets the ball rolling and the interest piqued.
I had to stop reading this in the buffer overflow chapter. Highlights include the flawed interpretation of the error message from when bigmac() returned (it returned to non-mapped memory, the book says it read past the end of a string); the horrible explanation of how buffers work (buffers are not simple variables, and variables do not allocate multiple chunks of memory for themselves as explained); and the incorrect description of the return-to-text attack (returned to existing code, but the book says it's run code you injected onto the stack). After reading a stream of these such inaccuracies, I stopped looking for something that actually came out right.
The buffer overflow chapter can easily be replaced with Hacking: The Art of Exploitation. Read that instead. It's also got better networking and WEP attack explanations.







