Hacking Exposed: Network Security Secrets & Solutions (Hacking Exposed)
by
Stuart McClure
(Author)
| Stuart McClure (Author) Find all the books, read about the author, and more. See search results for this author |
ISBN-13: 978-0072121278
ISBN-10: 0072121270
Why is ISBN important? ISBN
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Use the Amazon App to scan ISBNs and compare prices.
Add to book club
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Join or create book clubs
Choose books together
Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Buy new:
$11.24
Only 1 left in stock - order soon.
More Buying Choices
There is a newer edition of this item:
Systems administrators are often unaware of the dangers presented by anything beyong the most trivial attacks. Because of the day-to-day tasks, Y2K projects, and increasingly complex technology, administrators have perpetually back-burnerer security issues out of necessity. However, recent high-profile viruses and events like the White House website being closed down by hackers has brought the issue back to the forefront. With Hacking Exposed: Network Security Secrets and Solutions, Osborne will provide administrators with a modular and approachable reference so they can select the most pertinent information, rapidly digest it, and apply it immediately.
Popular titles by this author
Page 1 of 1 Start overPage 1 of 1
Product details
- Publisher : Computing Mcgraw-Hill (January 1, 1999)
- Language : English
- Paperback : 484 pages
- ISBN-10 : 0072121270
- ISBN-13 : 978-0072121278
- Item Weight : 2.2 pounds
- Dimensions : 7.3 x 1.25 x 9.1 inches
- Best Sellers Rank: #4,726,176 in Books (See Top 100 in Books)
- #531 in CompTIA Certification Guides
- #10,915 in Databases & Big Data
- #391,514 in Textbooks
- Customer Reviews:
About the authors
Follow authors to get new release updates, plus improved recommendations.

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
3.8 out of 5 stars
3.8 out of 5
36 global ratings
How customer reviews and ratings work
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Reviewed in the United States on August 18, 2000
The book is a good read and has many interesting examples of hacker attacks and tools. I'm an MCSE and a webserver administrator so I felt compelled to try all these hacking techniques on my servers and colleagues servers. The actual hacking techniques are over simplified and generally do not offer a casual hacker (non leet hacker) any opportunity to compromise you system. Only a way to impress their friends by saying - look I can tell what ports are open on this machine or look I can tell what operating system they are running etc. The explainations of defenses from these hacker probes and attacks I thought were very useful. The defenses are clear and relatively easy to implement. If you are paranoid - or take substantial pride in keeping hackers out of your system - definitley read this book. If you are generally interested in network WAN security, read this book.
8 people found this helpful
Report abuse
Reviewed in the United States on July 18, 2000
I purchased this book to educate myself on threats to networks. Although I have a strong computing background (degree in computational chemistry, 20+ years application programming), my network weakness made this book virtually incomprehensible.
It is laid out much like a dictionary where an attack is listed along with its popularity, simplicity, impact and risk rating. What usually follows is a very technical discussion of the attack and possible counter measures.
I suspect that this book would be a great use to network and system administrators, but I also suspect few others will get much out of it.
It is laid out much like a dictionary where an attack is listed along with its popularity, simplicity, impact and risk rating. What usually follows is a very technical discussion of the attack and possible counter measures.
I suspect that this book would be a great use to network and system administrators, but I also suspect few others will get much out of it.
13 people found this helpful
Report abuse
Reviewed in the United States on February 18, 2000
I have long been a hacker of the benign sort, as well as a senior corporate systems manager. When Internet hacking/cracking started to become a serious concern, I decided I needed to educate myself on the subject rather than continue to rely on my staff and consultants.
This book did an excellent job getting me started. You have to come into it knowing what traceroute means, but given that, the book's "it takes a thief to catch a thief" approach does the trick.
I recommend that every CIO in the world read this book. Or else.
This book did an excellent job getting me started. You have to come into it knowing what traceroute means, but given that, the book's "it takes a thief to catch a thief" approach does the trick.
I recommend that every CIO in the world read this book. Or else.
20 people found this helpful
Report abuse
Reviewed in the United States on July 4, 2014
This is a great book as are the other editions in the series. I just bought this to add to my library.
Reviewed in the United States on April 14, 2014
Just remember, if you know how to secure it, you'll know how to access it, even when it's already secured ;-)
Reviewed in the United States on May 12, 2018
Love these kinds of books. Full of information.
Reviewed in the United States on June 19, 2000
This is an excellent book on computer and network security. I thought I new a lot about the subject, but after reading this book from cover to cover I know how much work I need to do to secure my networks. The book is packed with real-world scenarios and up to date information and tools (or links to tools) needed to hack into virtually any type of system. Fortunately, the authors wisely chose to provide countermeasures for each hack listed, which is invaluable to anyone who's livelihood involves maintaining networks. The organization of the book is excellent - it takes you through the steps needed to hack a system, from identification and enumeration to actual penetration, but also allows the advanced reader to quickly find system specific information or methods. Several appendixes are loaded with links to security sites and tools, legal information, and even common port lists. A must read for anyone who owns a computer; you will realize how vulnerable you really are.
55 people found this helpful
Report abuse
Reviewed in the United States on May 4, 2000
Hacking exposed has a rather deceitful title however, is very honest if you read the cover. It has detail instruction and explaination for many security features and flaws in Unix, Linux, Windows NT, Windows 95/98, Windows 2000, Routers, and even individual freeware and commercial software releases. This is a great book to get your foot in the door on your basic network security. There is too much information on security available to print it all in one book, and the authors realize this and do not deny it. This book is not however and guide to hacking, and if you are interested in a book on hacking look elsewhere. Hacking is only presented with the 'disclaimer' of using it on yourself to make your system security stronger, which is a very valid point. Hacking cannot be published publicly, because the whole idea of hacking is contingent upon flaws in the way that software is set up and created. If these flaws are released to the public, namely the creators of the software, the exploitable point will most likely be fixed and rendered obsolete and useless. This book explains flaws that have exsisted and how you can fix them so they cannot be exploited to your disadvantage.
15 people found this helpful
Report abuse






