Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Unofficial Guide to Ethical Hacking 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
Customers Who Viewed This Item Also Viewed
Top Customer Reviews
I don't recommend this book -- well, I do. If you have a fireplace and you are out of wood. Other than that, save your money and search for other more serious books online.
Lots of waffle and posturing. Not convinced he actually understands the more advanced 'code' snippets he introduces (e.g. he manages to confuse a c 'header' with a 'library', also why would any serious security hacker write a keylogger in pascal!!!? Many parts are REALLY badly explained and have basic errors for a 2nd edition (see p356 - the first Xor table has a basic error in third row). Several bits of the text look suspiciously familiar (i.e. possibly cut and pasted from unacknowledge sources, which might explain the inconsistencies).
I gave two (generous) consolation stars because (a) the breadth is to be commended (at least he tried), and (b) the fact that you can still pick things up interesting snippets from this book; so long as you suspend the urge to yell WRONG! at it, and (c) Contrary to the previous reviewer who gave it 5 stars (a 'friend' no doubt) this book states on the last page that it is aimed at 'beginners'.
Most Recent Customer Reviews
Lot's of good info, even in the face of the rapidly changing digital landscape. Great info, and generally great reference material.Published on March 6, 2014 by JClanton
Great Book. I read 2600 and similar. Im not a serious hacker but love to
know the cracks. More armchair than doing . Lot of good stuff in this book. Read more
As an IT professional, I was looking for comprehensive reading to strenghten my network security knowledge. This book fulfilled that goal well. Read morePublished on February 24, 2006 by Wiltz Cutrer
As an IT professional, I was looking for comprehensive reading to strengthen my network security knowledge. This book fulfilled that goal well. Read morePublished on February 24, 2006 by Wiltz Cutrer