Showing posts with label hacks. Show all posts
Showing posts with label hacks. Show all posts

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Review

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
Average Reviews:

(More customer reviews)
Are you looking to buy The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Review"The Hacker's Handbook" is a comprehensive and entertaining volume on security. It has most of the defining traits of a great book, such as clearly stated goal (authors realize that lots of security books are out there and one needs to differentiate) as well as some unique content on application attacks.
The book is a technically sound volume, I found very few factual mistakes. I found some interesting content on central auth servers such as radius, which I haven't seen described well elsewhere. Defensive tool info is a bit jumbled and not new. For example, IDS coverage is too non-specific to be useful. I also found a couple of other chapters a bit weak on interesting content.
The book covers the security field on many levels - from concepts to scripts - and can be successfully used by entry-level people as well as experts. The book is better suited for technologists rather than managers. Security analysts/admins, hands-on security managers, security savvy system and network admins, students of computer security can benefuit from a book.
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.orgThe Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Overview

Want to learn more information about The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council) Review

Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council)
Average Reviews:

(More customer reviews)
Are you looking to buy Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council)? Here is the right place to find the great deals. we can offer discounts of up to 90% on Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council). Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council) ReviewThis books presents SIP, the protocol for Session Initiation. It covers many aspects, including conferencing, security, Internet telephony, user preferences.
The book is not 400+ pages as Amazon indicates but just below 300. Why does this matter? Because, with 17 chapters, this gives an average of less than 20 pages per chapter. As you can guess, 20 pages are not sufficient to explain topics such as Internet telephony, or conferencing. Even the SIP protocol is not presented fully. Only the major messages are listed with a short description of their use.
I was also disappointed by the book organization. The SIP Overview chapter which explains how SIP works is chapter 5. All the preceeding chapters mention SIP before we even know what SIP is. This is most confusing unless you have already some SIP knowledge.
The book tries to cover too much. We get a whirlwind tour of many topics, none of them explained appropriately. The book opens many issues that remain unanswered. If you want a shallow overview of SIP, this book may meet your need. But you are likely to quickly need something more in-depth.Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council) Overview

Want to learn more information about Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol (Networking Council)?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...