
Average Reviews:

(More customer reviews)Are you looking to buy The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks. Check out the link below:
>> Click Here to See Compare Prices and Get the Best Offers
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Review"The Hacker's Handbook" is a comprehensive and entertaining volume on security. It has most of the defining traits of a great book, such as clearly stated goal (authors realize that lots of security books are out there and one needs to differentiate) as well as some unique content on application attacks.The book is a technically sound volume, I found very few factual mistakes. I found some interesting content on central auth servers such as radius, which I haven't seen described well elsewhere. Defensive tool info is a bit jumbled and not new. For example, IDS coverage is too non-specific to be useful. I also found a couple of other chapters a bit weak on interesting content.
The book covers the security field on many levels - from concepts to scripts - and can be successfully used by entry-level people as well as experts. The book is better suited for technologists rather than managers. Security analysts/admins, hands-on security managers, security savvy system and network admins, students of computer security can benefuit from a book.
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.orgThe Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Overview
Want to learn more information about The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks?
>> Click Here to See All Customer Reviews & Ratings Now