Full description not available
A**L
Good, but scenarios getting out of date
The Challenge/Solution style of these books are great for security beginners as well as seasoned professionals. If you read carefully you can pick up many hints/tools which you can use in real life security scenarios.My only -ve comment about this book is its getting out of date now. Many of the incidents described are not relevant now, as security practices at most firms would thrawt these incidents. Having said that, the scenarios are still good for security beginners. For advanced readers I would suggest the Second edition or the soon to be released third edition.
A**A
Challenging and a great read
First edition and informative, while leading you to the why, where and how. Different and introductory ways of analyzing situations, but like the rest of the series, this book definitely is a must in any security library.
W**O
Read it with admire...
I am a Linux lecturer.And I like to read those books about Hacking and Security.Most of the books are not that easy to read.Because writers assume that their readers must have a strong background on those issues.Sometimes they just throw you the answer without explaination.But this book really makes a difference.It gives you the situation, makes you to think at first.And then you can read the answers at the back, review your original point of view.And every example it provides show us a possible breach in reality.Not those theory-based stories...Wanna secure your system?Just READ IT!! No matter buy it or borrow it...
A**T
I learned from these and they are still the best
Once upon a time I consumed and cherished these books... now I look back on them fondly and still recommend them.Now, I keep buying extra copies of these for other people. Though a few years old they are an excellent resource as is and great for poaching scenarios from as well.
B**R
great
great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.
T**C
great excersizes for log and incident review
The book has 20 hacker scenarios, the writer provides log samples and information regarding each incident, and you need to determine who,when,what and where. Each scenario has answer/solutions section to each incident where the forensic analyst provides their insight into each. I do security as my profession so I’m always looking for more examples of intrusions and how they are analyzed. I will most likely buy the rest in the series, this book was fun.
J**N
An Incredible Opportunity to Srutinize Actual Case Studies!
Along with advances in computer and Internet technologies we have also witnessed countless unlawful attempts to break into computer systems around the world with the intent to steal, damage, or otherwise compromise information.Hacker's Challenge by Mike Schiffman offers readers an incredible opportunity to scrutinize actual case studies of intrusion attempts - those attempts to gain unauthorized entry into computers systems to cause deliberate harm or mischief.Hacker's Challenge is broken up into two sections - 20 actual case studies with actual attack scenarios and log files (names and data have been changed for legal and confidentiality concerns), and corresponding solutions to them. Readers are challenged to read the case studies and determine for themselves how the attacks were made, what vulnerabilities were exploited, what harm, if any, had occurred, how to lesson the impact of future intrusions, and what possible remedies can be made to prevent future attacks altogether.Readers will learn how to determine the levels of attacker technical abilities and sophistication used. The case studies cover a broad range of attacks - those perpetrated by "script kiddies" who use existing attack code made available on the Internet and using publicly known attack methods, clever and skilled attackers who use publicly known coding and write their own code, and extremely skilled attackers who use publicly known coding, who write their own code, and who take advantage of non-public exploits and cutting-edge technologies to accomplish their evil work.Of further interest, the case studies and solutions presented in Hacker's Challenge will demonstrate how company officials and security consultant team members can effectively respond to different kinds of intrusion attempts. Their methods of discovery - much like police detective work, are fascinating, detailed, and very professional. Readers will follow along with them step-by-step to determine the order of events, to search log files and research events for clues, to think through issues for themselves, and arrive at their own conclusions. The solutions at the back of the book provide detailed answers, intrusion prevention measures, and a wealth of additional resources for further consideration.An added benefit of this book is that readers will learn about the skills involved in this kind of detective work, such as knowing about software programs and operating systems, knowing their particular vulnerabilities and exploits, knowing programming languages, reading log files, piecing together details, searching computer systems, searching buildings, interviewing suspects and witnesses, consulting with computer security experts, and putting to use essential people skills to obtain helpful information.Hacker's Challenge also presents readers with some valuable lessons to be learned - by learning from the mistakes of others. The case studies point out a number of system weaknesses that can be easily exploited to gain access to computer systems - including the keeping of system software default settings, using dictionary word passwords, failing to install the latest program versions, failing to install updates and security patches in a timely manner, failing to use anti-virus and intrusion detection programs, failing to use an appropriate firewall, failing to filter ports, failing to use appropriate encryption, failing to properly set radio strength - for wireless systems, and failing to either remove or disable unneeded programs and services on Web servers.Hacking poses many problems for a lot of people. Consequences of someone breaking into a computer system can affect the lives of many people - embarrassing downtime, lost revenue, stock market reactions, unemployment, public health and safety. Vigilance is key here - keeping up on the latest vulnerabilities and exploits, using the latest software versions and patches, and incorporating other necessary security precautions. This book will greatly benefit any company or person involved in handling information technology issues. It's also ideally suited for classroom and workshop use!
M**N
Real life scenarios
As a network security major, I have a lot of information just floating around in my head. This book has helped me by bringing it all together. I can't wait for the other two books in the series to arrive!
A**K
Five Stars
i personally love this book
G**S
Five Stars
ok
F**E
Ein Buch, das sehr aufschlussreich ist
Mich hat zunächst der Titel angesprochen. Nach dem Lesen (englisch) erhält man ein deutlich breiteres Verständnis zu Intrusion in Netze. Nicht nur das Ausnutzen von Exploits auch einfache Fehlkonfigurationen und deren Folgen werden aufgezeigt. Ich überlege, mir die anderen Bände auch zu kaufen.
Trustpilot
2 months ago
1 day ago