I own a lot of security books and I try to keep up with what his happening. After reading a few reviews I had been wanting to buy this book until I attended a conference where the author was singing books. So I got my signed copy and I have to say I am pretty impressed with the material. As other people have mentioned here, the author's attitude is to get right to the point and to provide useful examples wherever possible...
0Report
Got this book after I read a recent review. I found this book to contain some pretty cool attack & penetration techniques. Chapters like the one on NASL and the Zaurus PDA hacking are a nice addition. Since this is a hacking book, I disagree with the one review on here that complained about it not being complete. As far as the a & p techniques go, this book packs in more info than most 400+ hacking books I own. Saves a lot...
0Report
My favourite section of the book is 'Remote Hacking'which is a good 50 pages long. What I liked about this chapter is that it shows exactly howto use security tools to break into unix and linux servers. The other sections are interesting also. I highly recommend this book.
0Report
There are quite a few secucity related books out there nowdays. But most of them is just way too thick for me, to make matters worse those books are often filled with repeated or unwanted information. However, this book is different; it cuts right to the point and present me just the right amount of information that I wanted to know. At the same time, it is thin enough so I can carry it around with me. As a unix sysadmin I...
0Report
The description of this book does not do it justice. I didnt expect much but mainly purchsed it because I liked the sound of the titles of its special chapters in Wireless hacking, NASL programming (for Nessus), and hacking with the Zaurus PDA.At first glance, I wasnt sure how much material was presented. But after reading the first page or two, I realized the the purpose of the book, which is to give to-the-point information...
0Report