Full description not available
A**A
Great for any level of expertise
Easy to read/follow regardless of your level of expertise... Beginners will understand the content and professionals/executives will not feel bored. This is a must in our library and anyone concerned about security should add it as well.Great read!
S**N
Hackers
Hackers Challenge 3 is a good book, will buy again, very interesting, helps with hacking and catching hackers used it for class
B**R
Great
great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.
A**E
Five Stars
I love this book, it really helped my troubleshooting skills.
W**N
Very Helpful In Incident Response Excercise
I bought the entire series of these books to help my organization during Incident Response exercises. As part of our yearly audits we are required to test our procedures and tighten up any loose ends. I felt a great way to test them was with predefined scenarios such as the ones in this book. We had to modify them a little to meet our infrastructure and business model, but that was not too difficult. It was amazing to work through these scenarios as a group and see how each of us would handle the situations differently. Overall it was a very effective way to share ideas and thoughts on how we would handle these situations in the future.Overall I think the book was an enjoyable and thought provoking read, and can be used for real world situations. Perfect for getting your security team thinking about what might hit them next and how they will handle situations when they arise.
C**T
OK, but not what I expected from the HC series
The stories were entertaining but they lacked the detail I had been looking for. It would be a great book for non-technical managers to read so they know their techs are not just over-bearing security freaks.I also feel that several of the investigations were flawed in how they were conducted. It is possible that the book is just being faithful to the 'real' story, but it would have been good to see comments on what could have been done better at the end of each one.If you are looking for a broad picture of the types of attacks you might face and some procedures for what to do during or after an attack the book can be a helpful starting point (wake up call for some).
A**R
A Digest of the New World of Hack Attacks
What struck me about this book is that the attacks are all brand new. This isn't just a rehash of the same old attacks we read about over and over again, nor is it a rehash of the attacks - but on steroids - from the previous Hacker's Challenge books. The day of the simple port scan and null session enumeration are long gone. Today's world is much more complicated and scarier. Hacker's Challenge 3 proves it.And these aren't off-the-wall attacks cooked up in hidden computer labs by researchers. They're the type of threats now, unfortunately, becoming more commonplace to any one in information security.The chapters on phishing are real-life and could've been taken right out of the playbook of an actual attack perpetrated against a real bank. The steps for investigating, tracking down and bringing down malicious phishing sites closely follow those actually taken by information security professionals on the job.Another attack presented is pharming, a new and frightening type of DNS poisoning that threatens financial and e-commerce web sites. The description of the attacks is very accurate. It's almost as if you were working with the team trying to block the attack.Hacker's Challenge 3 is written by a star-studded cast of well-known industry players, each a top notch expert in their specialty in the field.For each attack, this book provides a complete set of steps for detection, resolution, prevention and evasion of future attacks. There are detailed examples of the forensics examination used to track down both the attack and its offending attackers, including samples of analyzed logs and data that would be used by an actual threat and incident management team in action on a case.Each chapter has a series of questions that add to the material and provide thought-provoking points for further discussion.This is a digest of the new world of Twenty-First Century attacks that should be read by every information security professional.
Trustpilot
1 month ago
2 weeks ago