e99 Online Shopping Mall
Help | |
Home - Computer - Hacking (Books) |
  | 1-20 of 100 | Next 20 |
click price to see details click image to enlarge click link to go to the store
1. Hacking Work: Breaking Stupid Rules for Smart Results by Bill Jensen, Josh Klein | |
Hardcover: 224
Pages
(2010-09-23)
list price: US$25.95 -- used & new: US$12.60 (price subject to change: see help) Asin: 159184357X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (11)
Hacking Work offers simple smart "work arounds" to overcome barriers toproductivity
On "Hacking Work"
Guide to thinking outside the box
Inspiring, Easy-to-Read, and Practical
The New Manifesto for Getting Stuff Done in the Google Era |
2. Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson | |
Paperback: 488
Pages
(2008-02-04)
list price: US$49.95 -- used & new: US$32.96 (price subject to change: see help) Asin: 1593271441 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment--all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. Customer Reviews (65)
help
Great Learning Material
Fabulous
Excellent Book
Excellent Book |
3. Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, Brett Hardin | |
Paperback: 304
Pages
(2009-09-10)
list price: US$39.99 -- used & new: US$25.03 (price subject to change: see help) Asin: 0596154577 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. Customer Reviews (10)
Good Intro to Next Gen Attacks
Good book with novel attack vectors
Timely, Meaningful, and Useful
A Good Introduction to Today's Top Threats
No serious programmer should be without this expose |
4. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition by Stuart McClure, Joel Scambray, George Kurtz | |
Paperback: 720
Pages
(2009-01-05)
list price: US$49.99 -- used & new: US$24.99 (price subject to change: see help) Asin: 0071613749 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The world's bestselling computer security book--fully expanded and updated "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc. "For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente "The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software "Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems "This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company "The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material: Customer Reviews (8)
Very good book- very minor issues
Hacking Exposed 6
6Th Edition, why?
Too Basic
Great Book |
5. Hacking For Dummies by Kevin Beaver | |
Paperback: 408
Pages
(2010-01-12)
list price: US$29.99 -- used & new: US$13.17 (price subject to change: see help) Asin: 0470550937 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking. Customer Reviews (19)
A great starting point to learn about Pen testing
Trusted Supplier
Great intro to hacking
Great reference
hacking for dummies |
6. Hacking the Xbox: An Introduction to Reverse Engineering by Andrew Huang | |
Paperback: 288
Pages
(2003-07)
list price: US$24.99 -- used & new: US$15.37 (price subject to change: see help) Asin: 1593270291 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description There's a wealth of information in these pages about how to disassemble and reverse-engineer electronics, and Huang is careful to show you what tools you need, and how to use them (don't worry if you don't know how to use a soldering iron--that's covered here). There also are step-by-step guides (complete with photos) to a couple of projects, and interviews with key figures in the Xbox-hacking community. --David Wall Topics covered: How to enjoy a Microsoft Xbox game console without the mindless tedium of playing video games. This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it. In the process, readers get an education in reverse engineering electronic circuits, as well as in basic electronic techniques (soldering, crimping, etc) and in the intellectual property law that governs hacker activity. Customer Reviews (27)
God!! it is being cited 46 times...
Bunnie inspires a budding computer engineer
Fascinating read, short on actual projects
Peerless
Good Reading |
7. Hacking Exposed Wireless, Second Edition by Johnny Cache, Joshua Wright, Vincent Liu | |
Paperback: 512
Pages
(2010-07-09)
list price: US$49.99 -- used & new: US$27.34 (price subject to change: see help) Asin: 0071666613 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. Customer Reviews (1)
A sequel that greatly improves on its predecessor |
8. HACKING EXPOSED WEB APPLICATIONS 3/E by Joel Scambray | |
Paperback: 482
Pages
(2010-10-15)
list price: US$50.00 -- used & new: US$31.50 (price subject to change: see help) Asin: 0071740643 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. |
9. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm, Jason Andress | |
Paperback: 376
Pages
(2010-09-24)
list price: US$49.95 -- used & new: US$28.95 (price subject to change: see help) Asin: 1597495883 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! |
10. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness | |
Paperback: 550
Pages
(2007-12-20)
list price: US$49.99 -- used & new: US$26.53 (price subject to change: see help) Asin: 0071495681 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description "A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker Customer Reviews (3)
Perfect!
Great Book!
A perfect reference for IT-security consultants |
11. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long, Jack Wiles | |
Paperback: 384
Pages
(2008-02-21)
list price: US$49.95 -- used & new: US$23.68 (price subject to change: see help) Asin: 1597492159 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (13)
Good, but needs improvement.
No Tech Hacking an eye opener
No Tech Hacking
Great
No Tech Skills |
12. Google Hacking for Penetration Testers by Johnny Long | |
Paperback: 560
Pages
(2007-11-02)
list price: US$49.95 -- used & new: US$19.35 (price subject to change: see help) Asin: 1597491764 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (25)
New updates and material for the second edition of the Google Hacking masterpiece. Volume 2 is today's reference.
Superb Book, great writing style and plenty of useful examples
Superior Text
google, hack, hacking
Great starting Point for New or Intermediate- Reference for advanced |
13. Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Aaron Philipp, David Cowen, Chris Davis | |
Paperback: 544
Pages
(2009-09-10)
list price: US$49.99 -- used & new: US$22.70 (price subject to change: see help) Asin: 0071626778 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description "Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Customer Reviews (2)
Great introductory text on Computer Forensics
Good Overview |
14. An Introduction to Probability and Inductive Logic by Ian Hacking | |
Paperback: 320
Pages
(2001-07-02)
list price: US$36.99 -- used & new: US$28.92 (price subject to change: see help) Asin: 0521775019 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (9)
recommended!
Connecting The Dots
Best text on logic and philosophy of probability
First Rate Introductory Text
Especially good on Bayesianism and Frequentism |
15. Hacking Exposed:Malware & Rootkits Secrets & Solutions by Michael Davis, Sean Bodmer, Aaron LeMasters | |
Paperback: 400
Pages
(2009-09-23)
list price: US$49.99 -- used & new: US$26.53 (price subject to change: see help) Asin: 0071591184 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect and eliminate malicious embedded code, block pop-ups and websites, prevent keylogging, and terminate rootkits. The latest intrusion detection, firewall, honeynet, antivirus, anti-rootkit, and anti-spyware technologies are covered in detail. Customer Reviews (4)
A great read with good ideas!
LAYMAN'S USE
The new breed of crackers...
Too much emphasis on rootkits |
16. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) by Joel Scambray, Mike Shema, Caleb Sima | |
Paperback: 520
Pages
(2006-06-05)
list price: US$49.99 -- used & new: US$9.73 (price subject to change: see help) Asin: 0072262990 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals. Customer Reviews (6)
Best book which gives you the feeling of how things are fragile
Great service
Required reading. A standard reference
I still go back to this book for reference
A very good book |
17. Hacking Harvard by Robin Wasserman | |
Paperback: 320
Pages
(2007-09-11)
list price: US$9.99 -- used & new: US$1.67 (price subject to change: see help) Asin: 1416936335 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description It's the ultimate challenge: breaking into the Ivy League. The hack: To get one deadbeat, fully unqualified slacker into the most prestigiousschool in the country. The crew: Eric Roth -- the good guy, the voice of reason. Max Kim -- the player who made the bet in the first place. Schwartz -- the kid genius already on the inside...of Harvard, that is. Lexi -- the beauty-queen valedictorian who insists on getting in the game. The plan: Use only the most undetectable schemes and techno-brilliant skills. Don'tbreak the Hacker's Code. Don't get distracted. Don't get caught. Take downsomeone who deserves it. The stakes: A lot higher than they think. They've got the players, the plot, and soon -- the prize. It's go time. Customer Reviews (8)
A quick and enjoyable read.
Perfect Timing
Hacking Harvard
Sacking Hacking
confusing |
18. Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky | |
Paperback: 592
Pages
(2004-07-08)
list price: US$49.99 -- used & new: US$12.50 (price subject to change: see help) Asin: 0321202171 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (19)
Outstanding reference
Still trying to get back to it.
Great overall review of wireless tech.
The secrets of Wireless Hacking
Excellent book |
19. Hacking Exposed: Network Security Secrets & Solutions, Second Edition (Hacking Exposed) by Stuart McClure, George Kurtz | |
Paperback: 703
Pages
(2000-10-11)
list price: US$43.95 -- used & new: US$0.38 (price subject to change: see help) Asin: 0072127481 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The result of all of this familiarity with bad-guy tools is a leg up on defending against them. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective. Taking on the major network operating systems and network devices one at a time, the authors tell you exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. They spare no criticism of products with which they aren't impressed, and don't hesitate to point out inherent, uncorrectable security weaknesses where they find them. This book is no mere rehashing of generally accepted security practices. It and its companion Web site are the best way for all of you network administrators to know thine enemies. --David Wall Topics covered: Customer Reviews (88)
Covers lots of info, but specific knowledge required
Must have for any Security Professional
Good to know!!!
Great Network security book
Overrated |
20. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) by Kevin Beaver, Peter T. Davis | |
Paperback: 384
Pages
(2005-09-13)
list price: US$26.99 -- used & new: US$14.25 (price subject to change: see help) Asin: 0764597302 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: Customer Reviews (9)
Worth reading but don't expect to be an expert
Excellent all-around book on wireless hacking
Writing useless books for dummies
Dummies unite!
Comprehensive wireless security reference |
  | 1-20 of 100 | Next 20 |