e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Computer - Hacking (Books)

  Back | 81-100 of 100

click price to see details     click image to enlarge     click link to go to the store

$0.84
81. Hacking MySpace: Mods and Customizations
$2.63
82. Windows 2000 (Hacking Exposed)
$17.99
83. Hacking Red Hat Enteprise Linux
$21.86
84. Designing BSD Rootkits: An Introduction
$4.47
85. Hacking iPod and iTunes (ExtremeTech)
$23.14
86. Hacking VoIP: Protocols, Attacks,
$25.49
87. Chained Exploits: Advanced Hacking
$11.42
88. Hacking Timbuktu
$3.61
89. Hacking Photoshop CS2
$9.99
90. Hacking the TiVo, 2nd Edition
$3.95
91. Take a Walk: 100 Walks Through
$6.03
92. Internet Security: Hacking, Counterhacking
$26.45
93. Hacking Exposed Linux, 3rd Edition
 
94. A concise introduction to logic
$14.22
95. Hacking: Digital Media and Technological
$38.00
96. Hacking Cyberspace (Polemics Series,)
97. Underground: Tales of Hacking,
$8.00
98. Gray Hat Hacking : The Ethical
$59.35
99. Practical Hacking Techniques and
$21.99
100. Hacking a Terror Network: The

81. Hacking MySpace: Mods and Customizations to make MySpace Your Space (ExtremeTech)
by John Pospisil
Paperback: 408 Pages (2006-08-28)
list price: US$24.99 -- used & new: US$0.84
(price subject to change: see help)
Asin: 0470045841
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Get noticed. Get discovered.

It's YourSpace

There are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and content of your profile. You get the inside scoop on hot design and photography. You maximize the effects of HTML and CSS. And, if you happen to be a musician, you check out Chapter 30 to see how MySpace can launch your career. It's all in here. What are you waiting for? Make it all about you.

Complete code and instructions for these and more MySpace hacks:

  • Embedding graphics
  • Creating animated images
  • Developing your own background
  • Building custom cursors
  • Changing profile text styles
  • Getting kinky with links
  • Adding a comments box
  • Altering your contact table
  • Redesigning the navigation bar
  • Making DIV overlays

A companion Web site provides even more tricks and techniques.

Visit www.myspaceismyplace.com to find all code from this book, links to software and featured profiles, a reader forum, and more. ... Read more

Customer Reviews (12)

2-0 out of 5 stars Outdated Rubbish
If I was to sum this whole book up into three words, it would be -- Boring and Dull. This book was not at all what I expected. It showed how to create really dull myspace pages and example links that weren't even existing anymore. This is a bland book, nothing to be excited about like I was. I wanted something to show me how to create spectacular band myspace sites, this book only covers the very basics of myspace code, and doesn't even know where it is going. i don't recommend this book unless you don't mind disappointments.

5-0 out of 5 stars amazing book
The reason I was compelled to write this is because the person who wrote that you have to type in all the code didn't even read the book. It's all available online. I am starting a business and creating advertising from Myspace and this book was the perfect compliment to all that mixed information on the web. It's very comprehensive and usable. Thank you Mr Pospisil.

2-0 out of 5 stars Hacking My Space
This one is for the geeks.The most helpful thing about it was about 15 pages into it, it states if you do not understand all this computer language go look at all the sites online that will help you "Pimp your site" or my pace editors that makes life a lot easier. The other thing in the book is that it teaches you how to get the advertisements from these other sites off yours.I am not sure if the price it was worth it for that..but it did help.

4-0 out of 5 stars Good if You're a Beginner
I got this book for myself because I've been doing a lot of web design work and I've been doing the majority of my design work making DIV overlays for Myspaces.I got this book hoping it'd help me out with advanced CSS manipulation of band Myspaces, but it turns out there's nothing in there like that.The reason why I gave it four stars is because if I were a beginner at coding Myspaces then I would greatly appreciate having this book.It is a very organized, well written book with lots of great information that would really help out anyone that is looking to start seriously messing with HTML and CSS meant for Myspaces for the first time.It would have gotten a 5 star rating if it went further explaining advanced page layout properties, but what I can say is that this book doesn't have anything that you won't find doing a simple google search of "myspace codes."

4-0 out of 5 stars A good resource
This is a really good book for doing what it says it's trying to do - teach you to personalize your MySpace page. It has a good balance; it's not so technical that it overwhelms and not so simple that it isn't useful. ... Read more


82. Windows 2000 (Hacking Exposed)
by Joel Scambray, Stuart McClure
Paperback: 500 Pages (2001-08-29)
list price: US$49.99 -- used & new: US$2.63
(price subject to change: see help)
Asin: 0072192623
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
From the best-selling co-authors of the world-renowned book, Hacking Exposed, comes Hacking Windows 2000 Exposed. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks andweaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.Amazon.com Review
With a revised Microsoft operating system comes a revised set of security holes and means of attacking them. Hacking Exposed: Windows 2000 presents a snapshot of known Windows 2000 security weaknesses and the tools that have been developed to exploit them, in turn enabling system operators to mount better defenses. This book builds on and contributes to the small but respected Hacking Exposed series, giving network administrators a detailed picture of the threats their Windows 2000 machines face--and all the motivation they should need to install the latest patches right away. Which points out a characteristic of this book: Many of the problems it catalogs are known bugs that shouldn't be a problem if you've installed the latest fixes and have good password and privilege policies. The point: Even with this book on your shelf, keep an eye on the security sites for news of emerging problems.

Joel Scambray and Stuart McClure have chosen to organize their book according to the steps involved in system compromise (identifying a target, gaining access and privileges, using or destroying the system, and so on) as well as by area of vulnerability. In addition to well-written passages that explain general hacking strategies and concepts, the authors devote sections to software (meaning native Windows commands, tools that are part of the Windows NT/2000 Resource Kit, as well as external software). Sometimes, they'll just offer a description, but most of the time, the authors present a step-by-step guide to carrying out the exploit at hand. This is a valuable book that every Windows 2000 expert should read closely. --David Wall

Topics covered: How to break into a Windows 2000 system and, by extension, how to go about defending against attacks. Sections deal with tools for locating victim systems, gaining access to them, and either damaging them, overloading them, or using them as bases for further attacks. The authors also highlight the weaknesses in Windows 2000 services, including Internet Information Services (IIS) and Microsoft SQL Server. ... Read more

Customer Reviews (23)

5-0 out of 5 stars Hacking exposed: excellent books
This is a general comment regarding Hacking Exposed series. I owned Hacking Exposed (first edition) and then I moved to the more specific Hacking Exposed books, so now I've got Hacking Linux Exposed, Hacking Windows 2000 Exposed and hacking web Applications exposed. All those books absolutely worth it, do not hesitate to buy any of them.

5-0 out of 5 stars Buy this book if you use windows
Don't run Windows without it.An in-depth windows security book written for those who do not understand geek.Easy to read and chocked full of info provided to save you from common (and not so common) windows sins.Definitely for the home and enterprise network user/admin.

5-0 out of 5 stars The best security manual I have ever seen
If you are responsible for a Windows 2000 server and do not have this book, you are asking for trouble.Get it today!!!!

4-0 out of 5 stars Excellent book - useful from the first read
My security officer loves this book because it allows him to send me emails guaranteed to keep me up at night. ;-)

5-0 out of 5 stars Excellent security book
Excellent book which helps you secure your system from the attacker's point of view. It makes you think as a hacker to be able to find the vulnerabilities in your machine/network. ... Read more


83. Hacking Red Hat Enteprise Linux
by Paul T. Ammann
Perfect Paperback: 200 Pages (2009-10-19)
list price: US$29.99 -- used & new: US$17.99
(price subject to change: see help)
Asin: 0557163110
Average Customer Review: 5.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book is to provide security configuration recommendations for the Red Hat Enterprise Linux (RHEL) 5 and 6 operating system. The guidance provided here should be applicable to all variants (Desktop, Server, Advanced Platform) of the product. Recommended settings for the basic operating system are provided, as well as for many commonly-used services that the system can host in a network environment.

  • Covers Red Hat Enterprise Linux 5 and 6
  • Install, maintain, and update software
  • Learn how to modify file and directory permissions to prevent unauthorized users
  • Prevent unauthorized people from gaining shell access to accounts, particularly to privileged accounts
  • Master SELinux configuration
  • Configure logging, log monitoring, and auditing, using tools included with RHEL5
  • In-depth coverage of base services that are configured to start up on boot in a RHEL5 default installation
  • ... Read more

    Customer Reviews (1)

    5-0 out of 5 stars Hands-on Red Hat Linux Manual
    This is Not a book to teach you the basics about Linux.This book is kind of study note from an experienced Linux user.Compared to those 1000 pages linux books, this book is more concise and right to the point for Linux administration. I particularly appreciate author's effore on the explanation of default Red Hat firewall, which you will not find in the other books, and SSL certificates.Recommeded.
    ... Read more


    84. Designing BSD Rootkits: An Introduction to Kernel Hacking
    by Joseph Kong
    Paperback: 144 Pages (2007-04-10)
    list price: US$29.95 -- used & new: US$21.86
    (price subject to change: see help)
    Asin: 1593271425
    Average Customer Review: 4.5 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.

    Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.

    Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.

    Included:

  • The fundamentals of FreeBSD kernel module programming
  • Using call hooking to subvert the FreeBSD kernel
  • Directly manipulating the objects the kernel depends upon for its internal record-keeping
  • Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running
  • How to defend against the attacks described

    Hack the FreeBSD kernel for yourself! ... Read more

    Customer Reviews (4)

    5-0 out of 5 stars A perfect programmer's guide.
    Collections strong in web design and programmer's guides know that rootkits have a negative image - but DESIGNING BSD ROOTKITS provides all the information on how to overcome any bad image and problems to develop effective rootkits under the FreeBSD operating system. This instructional is actually a tutorial, so it may also be used in programming classes: it explains how to maintain root access and how to hack Free BSD, using many examples which assume no prior kernel-hacking knowledge. Code is described, analyzed, and linked to real-world scenarios for maximum understanding, making for a perfect programmer's guide.

    5-0 out of 5 stars Concise, informative, powerful -- a real winner
    I loved Designing BSD Rootkits (DBR) by Joseph Kong, and I'm not even a kernel hacker.Rather, I'm an incident responder and FreeBSD administrator.This book is directly on target and does not waste the reader's time.If you understand C and want to learn how to manipulate the FreeBSD kernel, Designing BSD Rootkits is for you. Peer into the depths of a powerful operating system and bend it to your will!

    DBR covers much of the same sorts of material found in the earlier Rootkits: Subverting the Windows Kernel by Greg Hoglund and James Butler, except Kong's book is all about FreeBSD.I actually read the Windows text first, but found Kong's more direct language and examples easier than the Hoglund/Butler text.After reading DBR I have a stronger understanding of each of the main chapters' techniques, i.e., kernel modules, hooking, direct kernel object manipulation, kernel object hooking, run-time kernel memory patching, and detection mechanisms.I particularly liked the author showing his sample rootkit's effectiveness against Tripwire, simply to demonstrate his methods.

    DBR follows another tenet of great books: it credits previous work.Several times in the text Kong says where he learned a technique or what code he's modifying to do his bidding.This should serve as an example to other technical authors.Kong also does not treat his subject matter as a dark art practiced by people in long black coats at Def Con.He is professional and mentions where certain techniques like run-time kernel memory patching are used by commercial operating systems for "hot patching," as happens with Windows.

    I have nothing bad to say about this book, although to get the absolute full learning experience it helps to know C programming, some assembly, and FreeBSD kernel internals.The Design and Implementation of the FreeBSD Operating System by McKusick and Neville-Neil (another excellent book) is helpful preparatory reading.The fact that Kong provided all of his source code for download is also very much appreciated.Bravo!I look forward to your next book.

    4-0 out of 5 stars Enjoyable primer on system kernel penetration
    --- DISCLAIMER: This is a requested review by No Starch Press, however any opinions expressed within the review are my personal ones. ---


    This enjoyable readable book gradually and very systematically evolves around hacking the kernel of a BSD system.

    Chapter 1: Loadable Kernel Modules 22p.
    Chapter 2: Hooking 13p.
    Chapter 3: Direct Kernel Object Manipulation 20p.
    Chapter 4: Kernel Object Hooking 4p.
    Chapter 5: Run-Time Kernel Memory Patching 27p.
    Chapter 6: Putting It All Together 26p.
    Chapter 7: Detection 8p.

    Its written in a style that allows also non-developers to grasp the main procedures and steps involved for modifying a systems kernel (assuming the attacker gotaccess to a privileged system account).

    Chapters 1 to 5 explain the several methods for modifying the kernel.

    While the book is divided into 7 chapters, its most value really is the Chapters 6 which has many of those WoW effects included.

    All or most technics described of chapters 1-5 will be used in chapter 6 for show casing how to circumvent an HIDS. Here is where all learned technics finally come all together.

    So the reader dabbles with the author from an initial "simple" idea of bypassing an HIDS from one issue to the next. First the system call is hooked, so technically its kind of working, but then we realize that in order to make it perfect we need to hide the just created file (which contains the execution redirection routine). So the next obvious step is to hide the file so we dont leave a footprint on the system, just to realize that we need to hide the KLD (Dynamic Kernel Linker). So now everything is hidden but we forgot about the change of the /sbin directories access/ modification and change time, so we have to go after that too...

    Its technically very interesting to learn how the author approaches the issues involved in order to avoid being detected by the HIDS or commands the user might use. That the author is technically on top of things is also shown f.e. by some info included in the book which is already referring to FreeBSD 7.

    To get the most out of the book you ideally have programming knowledge of C, assembly etc. and debugging software systems. So I think its most valuable to system administrators, developers and security consultants.

    4-0 out of 5 stars Fun and informative
    I don't do a lot with BSD nowadays.. a lot of software customers want is only for Linux, and although sometimes it could be ported, the customers seem to want Linux.However, I cut my teeth on old SunOS, so bsdisms are familiar and friendly to me.

    Working through this book was fun and informative.You can download sources from [....]

    The concepts apply equally well to Linux, of course, and I also realized that some of the areas explored come up in ordinary application work and especially in system troubleshooting, so this isn't entirely about subverting systems for evil purpose.

    ... Read more


  • 85. Hacking iPod and iTunes (ExtremeTech)
    by Scott Knaster
    Paperback: 312 Pages (2004-08-13)
    list price: US$24.99 -- used & new: US$4.47
    (price subject to change: see help)
    Asin: 0764569848
    Average Customer Review: 3.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Today's iPod can do much more than just play music. Apple now includes software for keeping track of personal contacts, viewing appointments, reading notes, and even playing games. But iPod owners crave more. They explore the nooks and crannies of iTunes and their iPods, discovering and inventing amazing new ways to use their devices.

    Hacking iPod and iTunes teaches readers everything needed to use the most obscure and least documented features of Apple's software, but that's just the starting point. For the dedicated, hardcore iPod users who are ready to really unlock the potential of this great hardware device, Hacking iPod and iTunes reveals the secrets of more than 100 hacks, tweaks and mods, unlocking both the musical and non-musical tricks in the iPod's repertoire.

    With Hacking iPod and iTunes, readers will roll up their sleeves, put on their headphones, and groove to iPod and iTunes hacks including:

  • Download news headlines, stock quotes, weather, and even driving directions to iPod
  • Install and run LINUX on iPod
  • Create adventure games for iPod
  • Use iPod as a Bluetooth transmitter
  • Tweak Gracenote CDDB in iTunes
  • Hack your iTunes music library
  • Hack iPod’s database
  • Getting access to secret options in Visualizer
  • Hack album covers

    and so much more – over 100 hacks, tweaks and mods for the world’s most popular music player and software. ... Read more

    Customer Reviews (13)

    2-0 out of 5 stars OK but dated
    It's my own fault, but I failed to notice that this book was published in 2004. I'm sure it was excellent then, but today, much of the info contained in the book is dated, many of the websites mentioned no longer exist, and the ipod technology of today (2007) has rendered much of the interesting stuff that can't be found elsewhere obsolete. If Mr. Knaster should release a second, more current edition, I'd buy it.

    4-0 out of 5 stars Thanks
    Have just gotten the book. Saved time and it helped restore my library. Has some cool items. In 30 minutes time have gotten a better understanding of my Ipod and Itunes. Looking forward to finishing the book to learn more. Thanks

    1-0 out of 5 stars Not hacking or insightful.
    I will agree with others that none of the contents of this book are very interesting.All of the information can be found by applying 1) Common sense, 2) reading the product instructions, 3) doing a bit of research on your own online.

    Its also not about hacking.To the 'dim bulb' that suggests one is foolish for complaining about that mis-use of the term, just because this is a book in aseries: sorry, but your wrong.The term 'hacking' has a specific meaning in technology circles.You don't get to redefine it at a whim or misuse it and expect folks to say, "ok, sure, fine".Hacking is about finding those functions, features, information on a system that are not available in plain sight or documented in the product manuals.

    Using the given functionality of something to some interesting purposes is not a hack.Its a use, to be sure.A hack has to be something thats not intended to be known by the maker, or similar.Getting at a hidden service menu - that, is a hack.

    Using aluminum foil on a TV antenna is NOT a hack- its a fix.You may be a hack for using it to fix the antenna, but thats another issue.Now if you can use aluminum foil to decypher your old analog HBO feed - that, would be a hack (an admittedly illegal variety of hack, but still a hack).

    If the series of books is misusing the term 'hacking' then they are being repeatedly incorrect and misleading people.Calling this a book on hacking is wrong, and the fact that its a series will not make it right.

    Save your money and follow your own curiosity over the internet.

    If you find this sort of fluff really that usefull and believe this is justifiably using the term 'hacking', then be all means,spend the cash, but don't expect tech savy folks not to giggle and point at you when you proclaim you are using a hack from this book.

    2-0 out of 5 stars Hacking in the sense that bubblegum is food
    As the reviewer below suggests, this isn't a book so much about how to find cool new features/things to do with your Ipod as it is an instruction manual similar to what should have been supplied with the device to begin with.Most of the info either is available online or somewhat obvious, given the intuitiveness/limitations of the Itunes software and the UI of the device itself.

    As much as I was hoping otherwise, this book isn't worth the money.Not even particularly for anyone uncomfortable with technology.

    ...If you really want to improve how your Ipod operates, check out Anapod Explorer, and spend the money there that you would have spent on this.

    5-0 out of 5 stars the cool reality of your ipod
    scott "special k" knaster is old skool apple, with no less than seven mac books you can buy on amazon right now (and another coming) ... he's so entrenched in the apple psyche and culture that he's almost certainly forgotten more about apple and the mac than any "normal" citizen has ever known ... in short, he's *exactly* who you want acting as your digital tour guide.

    reading h.i.a.i. is like having your favorite brother sit down and show you everything your ipod can do.all the in's and out's of the super-cool digital music world are laid out in an easy to read, logical and fun fashion.

    no matter how much you like your ipod, you'll like it better after spending a little time with special k.


    and these other reviews?some of them just bust me up:

    "you can find all this stuff online"
    - uh, sure.you can find the whole frickin' world online.is all the stuff in the book online?i honestly don't know.do *i* want to go looking for it all?hell no.that's what a book is *for*.my time, and the permanence of having something on my self, is worth 20 bucks.a library must be a huge disappointment to that reviewer.

    "he calls these 'hacks?'"
    - it's the name of the series, dim bulb.when you write a book in a series, it gets that title.i wrote "winning at internet poker for dummies," but it doesn't mean you *have* to be a dummy to buy it.if you buy a book like h.i.a.i. and expect to get a "hack" along the lines of learning how launch nuclear missiles with your ipod, you're going to be let down by default.


    thanks for reading. ... Read more


  • 86. Hacking VoIP: Protocols, Attacks, and Countermeasures
    by Himanshu Dwivedi
    Paperback: 220 Pages (2008-03-21)
    list price: US$44.95 -- used & new: US$23.14
    (price subject to change: see help)
    Asin: 1593271638
    Average Customer Review: 4.5 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description

    Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

    Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

    Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:

    • Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
    • Audit VoIP network security
    • Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
    • Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
    • Identify the many vulnerabilities in any VoIP network

    Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

    ... Read more

    Customer Reviews (2)

    5-0 out of 5 stars An Excellent VoIP Security manual
    Eureka! What a pleasant surprise. This is the best Hacking book I have ever read. as matter of fact the book scared me so much that if asked I would classify it as "non-fictional horror".

    According toHimanshu Dwivedi "Hacking VoIP is a security book written primarily for VoIP administrators"; This statement is in the introduction of the book, that is the only thing I did not find to be true, I like to change that statement to read something like " .....a security book written primarily for Information Security and Auditors it can also be used by VoIP administrators.....".

    I accidentally started reading this book, and I just got hooked. The book is devided into 4 sections;
    1-Introduction VoIP Security
    2-VoIP Protocols
    3-Security treats
    4-Securing and Auditing VoIP
    The 4 sections are contained in very well organized 10 Chapters. Each chapter, no each line of each chapter is a list of ingredients needed to break in to a VoIP phone, switch or a server.

    The author goes at great lengths creating a VoIP lab, following his step by step recommendations and downloading the programs listed, I actually created the exact same lab, I have no idea why. Than downloaded the hacking tools, which should go in the blacklisted application database of every business, once again following the steps outlined in the book I could actually break into conversations, change caller ID (you can really play sick tricks with this feature), and realize that the 6 character password I have for my voice mail is actually crackable in less than 10 minutes.

    OK!, Where is the beef? You may ask, how can I use this book? Well! Up to Chapter 9 you learn what a malicious person is or may try to do. Chapter 10 you learn to identify weaknesses and block the attempts, integrating this with a well planned Information Security Management System such as ISO 27001, and creating an audit plan based on recommendations, you can rest assured that your VoIP is secured, you probable need to read about implementing 802.1x, this is also a recommendation in the book.
    Best Fishes and thanks for reading.

    4-0 out of 5 stars Great resource to understand VoIP security
    Voice over IP (VoIP) communications are a core component of the next wave of communications. Consumers and enterprises both are beginning to grasp the benefits of VoIP communications and making the switch from traditional voice communications to VoIP.

    VoIP can be a double-edged sword as well though. It provides cost savings. It adds flexibility and extensibility that isn't possible with traditional telephone communications. It enables a whole new scope of applications to interact with and leverage voice communications in whole new ways.

    However, with all of those benefits, it also merges voice data onto the standard data network and exposes what was a relatively secure system to a wide variety of attacks and exploits. Traditional voice attacks like eavesdropping or wiretapping are still issues, but on a grander scale. And now voice communications can also be subjected to denial-of-service (DoS) and man-in-the-middle (MiTM) and other attacks that have traditionally been reserved for data networks.

    With Hacking VoIP: Protocols, Attacks, and Countermeasures from No Starch Press, Himanshu Dwivedi explores the security issues inherent with VoIP communications and how to protect your VoIP system against them.

    Dwivedi opens the book by walking through how to build a VoIP lab environment to use as you read through the book to get first-hand experience and understanding of the VoIP attacks and exploits and the countermeasures to use against them. This hands-on experience helps the reader to see the attacks in action rather than just reading about them.

    The book provides a good background on the VoIP protocols themselves, and Dwivedi does an excellent job of explaining the weaknesses and exploits. VoIP admins should read this book and follow Dwivedi's advice to protect their VoIP environments. ... Read more


    87. Chained Exploits: Advanced Hacking Attacks from Start to Finish
    by Andrew Whitaker, Keatron Evans, Jack B. Voth
    Paperback: 312 Pages (2009-03-09)
    list price: US$49.99 -- used & new: US$25.49
    (price subject to change: see help)
    Asin: 032149881X
    Average Customer Review: 3.5 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description

    The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

     

    Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits–both how to perform them and how to prevent them.

     

    Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.

     

    Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures— both technical and human. Coverage includes:

    • Constructing convincing new phishing attacks
    • Discovering which sites other Web users are visiting
    • Wreaking havoc on IT security via wireless networks
    • Disrupting competitors’ Web sites
    • Performing–and preventing–corporate espionage
    • Destroying secure files
    • Gaining access to private healthcare records
    • Attacking the viewers of social networking pages
    • Creating entirely new exploits
    • and more

     

    Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award.

     

    Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award.

     

    Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad.

     

    informit.com/aw

    Cover photograph © Corbis /

    Jupiter Images

     

    $49.99 US 

    $59.99 CANADA

    ... Read more

    Customer Reviews (14)

    4-0 out of 5 stars Well written and easy read
    The book focuses on real techniques that are used by attackers to perform hacks. It is well written in that each chapter is clearly laid out with an intro, steps to complete the attack, and countermeasures. The authors effectively link together the multiple exploits and tools that are needed to perform a real world attack. As anyone who works in the security industry can attest, there are almost unlimited methods an attacker can use to conduct an attack. Although the author's choice for performing attacks may not always be the simplest or most realistic, they allow the authors to introduce numerous vulnerabilities and the authors also offer suggestions for other ways that the attacks could be conducted.

    As the version of the book that I read was not a first edition, it was apparent that the order of the chapters had been rearranged making the flow of the overall book a little disjointed. Some chapters focused in depth on technical details of using tools while others were much more high level.

    In all, it was a very good read and I would recommend it to anyone who is working or has an interest in security and especially penetration testing.

    3-0 out of 5 stars Just OK
    I purchased this book recently at a security conference along with a moderate discount.After reading I'm happy to say that a discount was applied.The book is a set of eight (8) short stories that follows a fictitious character named "Phoenix" as he completes various "Chained Exploits" to take over targets.The book does a great job keeping the reader's attention with the sometimes confusing storyline.The creative thinking the authors used wouldn't be my first choice in the attack scenarios, but it appears to work.The book makes a great reference for security students or novice professional but unfortunately the book falls short on the advanced side and instead should be titled "CHAINED EXPLOITS: Hacking Attacks from Start to Finish.

    5-0 out of 5 stars Each attack is analyzed one step at a time
    Andrew Whitaker, Keatron Evans and Jack B. Voth's CHAINED EXPLOITS: ADVANCED HACKING ATTACKS FROM START TO FINISH provides a fine guide to chained attacks and is a pick any network security library must have. Chapters cover new phishing attacks, how IT security can be vulnerable to wireless networks, how competitors' web sites are disrupted, and more. Each attack is analyzed one step at a time with the latest countermeasures - technical and human - covered. An outstanding presentation.

    5-0 out of 5 stars A multi-scenario hacking adventure novel focused on combined real-world attacks.
    The penetration testing (and criminal) field has focused during the last years on increasing the foothold on compromised systems, proving advanced pivoting and post-exploitation techniques that might help to expand the compromise to other systems or critical resources. This book is a novel that describes these reality by telling hacking stories where multiple techniques, tools and vulnerable input vectors are exploited in order to accomplish a variety of clearly defined attacks and goals.

    Each chapter is a well structured story describing multiple attack scenarios. From credit card theft, to insider threat, going through corporate espionage focused on stealing confidential intellectual property, the launch of a DoS attack in a key point in time, the risk and exploitation of inter-corporation network connections, physical access to healthcare records, up to social networking and wireless break-ins.

    The book is a modern fictional narrative with technical touches, covering attacks from start-to-finish in elaborated stories (my score evaluates the book from this perspective). However, by reading the book description, you might expect a deeply technical book that will teach you how to perform those attacks, and... it is not.

    Every attack story is introduced by setting the stage and the overall attacker approach. Besides that, it is surrounded by a few final defensive tidbits and conclusions, describing countermeasures to mitigate the various attacks covered. This book may act as an excellent eye opener for managers and top level positions (see recommended audience below) in order to understand how small security investments and tweaks can definitely help to increase the overall protection of a target environment substantially.

    Unfortunately, from a technical perspective, some of the technical details have not been thoroughly reviewed, such as the output of nmap (order of ports), the unexplained switching of target systems from Vista to XP, the targeting of RDP while not on the port scan (chapter 4) , or the coverage of some tools. Some attacks are a bit outdated, such as the silent winpcap installation to capture traffic from a target box. However, I must admit this book inspired some of the components of a recent "Prison Break" hacking challenge I released this summer (2009).

    Specific portions of the book and, overall, the story plot, is well written from a novel perspective, and as particular attacks are progressing, it made me feel the common excitement we get when we are involved in a real penetration test and successfully progressing through the targets, getting the adrenalin going.

    This book is highly recommended for people entering in the security field, and for experienced technical security pros in two ways. On the one hand, it's an enjoyable and entertaining novel for a weekend or vacation period. On the other hand, it is a very good reference to give to managers and CxO positions so that they can get a feeling of how real-world attacks look like nowadays and the kind of targeted threats they may face.

    4-0 out of 5 stars Fun Read, Useful for Folks New to Security
    As you might guess, I often read security books for fun, not for solvinga particular technical problem. So I approached "Chained Exploits" by Andrew Whitaker, et al with that filter in mind. The book worked just fine for that purpose - it is well-written and has a story line, while covering enough technical details to be educational (for those who are reading it to learn about security and not just for fun). It covers the exploits of a malicious hacker "Phoenix" who fulfills the assignments of some underground criminal mastermind and sometimes just goes and 0wns somebody on his own. Obviously, the book does not cut it as "fiction" since it has actually commands, configuration, etc.

    The book is not about a new cutting edge technique or an "oh-day", its main goal is to actually tie "that security stuff" together for folks who are not skilled with it yet. IMHO, IT folks getting into security will benefit from it the most. If you 0wn boxes for fun and profit, you will not learn anything fundamentally new about security, but likely will have fun in the process. Think about it as "Life-like Security Horror Stories" or realistic scenarios. Still, these are a bunch of good story of how mundane, "uncool" attacks tie together to achieve some rampant 0wnage, like having people at a hospital almost die as a result of one particular scenario...

    Each story covers motivation and goals of the attach, planning stage, sometimes failed attempts (and why they fail), tool selection and some guidance on tool use. Then it explains what happens and finally covers countermeasures that could have stopped it.

    The book bears unfortunate, but noticeable signs of being written by multiple people who didn't talk to each other much.

    Finally, the name ("Chained Exploits") first turned me away from the book, I thought it was kinda silly; now I suspect that it will attract some folks to the book.

    Recommendation: definitely worth a read if you are new to security, especially if moving from IT. Useful for students in computer science classes to get motivated about security. Also useful for technical management to learn what is not just possible, but very real. Finally, useful for security folks - as a fun read - and also as a reminder about things in their own (still their own, not 0wned...) environments. ... Read more


    88. Hacking Timbuktu
    by Stephen Davies
    Hardcover: 272 Pages (2010-11-15)
    list price: US$16.00 -- used & new: US$11.42
    (price subject to change: see help)
    Asin: 0547390165
    Average Customer Review: 4.5 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description

    Danny is a freelance IT specialist–that is, a hacker. He and his pal Omar are both skilled at parkour, or freerunning, a discipline designed to enable practitioners to travel between any two points regardless of obstacles. This is fortunate, because they're off on an adventure that's filled with obstacles, from locked doors to gangs of hostile pursuers. Together they follow a cryptic clue, find a missing map, figure out how to get to Timbuktu without buying a plane ticket, and join the life-and-death treasure hunt, exchanging wisecracks and solving the puzzle one step at a time.An exotic setting and gripping suspense, as well as an absorbing introduction to parkour, make this thriller a genuine page-turner.
    ... Read more

    Customer Reviews (3)

    5-0 out of 5 stars Big adventure, high interest novel
    This is an exciting quest story.The book begins with a thief in an underground tunnel in the fourteenth century, Ankonio Dolo, a student at the University.Ankonio has tunneled his way into the treasury, where pure gold ingot bars are packed nine deep. His tunnel comes up behind the gold and he has spent years removing two million mitqals worth of gold bars.He has taken his gold to a safe place, a place he leaves a cryptic clue to once he is caught following an unfortunate series of events. Ankonio yells the gold is hidden in the Dogon cliffs and, "It takes a Dogon to know a Nommo," as he comes to a brilliant and shocking end.

    In the twenty-first century, two young men are scanning ancient manuscripts to computer when they find the doodling of the long ago student in the margin of a page in a math textbook.That discovery launches a quest for the legendary gold.But one of them is going to be put out of the running immediately.The one left standing has one goal.The gold.

    The London hackers are brought into the picture by a group calling itself Knights of Ankonio Dolo.Their methods are a little violent.Their goal?The gold.The abused hackers also now have a new goal.The gold.Omar and Danny are skilled in the practice of parkour - the ability to travel from one place to the next in a straight line very quickly, no matter the obstacles.They need to go to Timbuktu to find the cliffs of Dogon and the gold.The treasure hunters all converge on the same site.

    This novel is very likable.The fourteenth century boy and Omar and Danny are all the same age and have many of the same sensibilities.It's easy to hate the hate-able characters, easy to feel sorry for the likable ones.This is an adventure novel and is likely to be especially liked by young teenage boys.It is not too dense and stays pretty tight with the story.Personally I would cover the book with warnings. "Don't try this at home."

    4-0 out of 5 stars International adventure galore!
    So, I knew absolutely nothing about parkour before reading Hacking Timbuktu; however, in no way did this lack of knowledge diminish my enjoyment of the novel.I learned as I went.At first, I thought that all of the French terms would confuse me; I was woefully wrong, and they added great flavor to the read.Also, I knew little of the culture of Timbuktu but was enlightened as I read.This novel had a wonder international flavor to it.

    Action and adventure run rampant!If you want page-turning excitement, this is a book you will want to read.This a great addition the the Young Adult genre.If only more of the YA novels taught lessons. . . (Greed hides within us).

    4-0 out of 5 stars "From here on in it's all catting and hacking."
    I am 75 years old. In my lifetime I have seen America absorb previously unfamiliar sports such as surfing, skateboarding and soccer. And now there is parkour.

    In his Author's Note to his 2010 novel HACKING TIMBUKTU, missionary to Africa Stephen Davies, opines that he has just written "perhaps the first-ever parkour novel." You do not have to know anything about parkour before opening HACKING TIMBUKTU. The book will explain it all. But I was helped before I started reading, because my 15-year old grandson in Greenville, South Carolina took up parkouring (aka PKing) a couple of years back. I have ever since watched him leap across streams, scale pillars and fall without (too much) pain on shoulders, etc. after jumping off a ten-foot high tree house.

    Action is non-stop from beginning of HACKING TIMBUKTU to end. Two English boys, Danny Temple and Omar Dupont (the latter bilingual in French, which helps greatly when the boys reach francophone Mali), are swept into a worldwide frenzied hunt for treasure. 700 years ago Akonio Dolo, a fictional 17-year old mathematics student in Timbuktu, Mali, had cleverly stolen millions of dollars of gold from a mosque. He left clues where to find his trove but they were not noticed until a university project scanning all ancient manuscripts of Timbuktu into computers popped up Akonio Dolo's clues.

    Danny Temple is a world-class white hatted (i.e., he does no harm) computer hacker with some knowledge of parkour. His friend Omar Dupont is a master of parkour but a bit of a computer dud. Throughout HACKING TIMBUKTU there is constant interplay between the mental games played by the mind and the physical games played by bodies (called traceurs) that do parkour (PK). A perfect example, from many, is what happens at the Gatwick Airport. The two boys, after fleeing across the rooftops of London from The Knights of Akonio Dolo (Danny even made a daring three-storey dive into the Thames), are determined to fly to Mali and find the treasure for themselves. But they don't have enough money. Yet Omar has Air France's equivalent of Frequent Flyer Miles. If Danny can tap into the computer at the Air France travel desk, he can increase the miles in Omar's account and, voila, off they go!

    And the following episode allows me to flesh out my review title "From here on in it's all catting and hacking." Daniel had climbed up high above the Air France station. He reached a beam, cut into a computer cable and did the necessary penetrating of fire walls, using software conveniently attached to his Swiss army knife.

    Parkour and hacking: what a high! "Catting" refers to "cat balance," a maneuver you can find all over YouTube. "Cat balance had been one of the first techniques Danny learned. ... Left palm, ball of right foot. Right palm, ball of left foot. Head down, back straight. ... You had to practice until you couldn't get it wrong" (Ch.20)

    With the whole world in pursuit, Dan and Omar figure out where the treasure is hidden. But Moktar Hasim, a murderous Arab knows too. And he won't hesitate to kill them if he finds them there before him.

    I remember my own pleasure 65 years ago reading books like Sinclair Lewis's boys adventure taleHike and the Aeroplane and R. Sidney Bowen's Dave Dawson with the R. A. F. (The War Adventure Series, 2) (Yank teen and UK teen team up to defeat the Axis). I think my computer savvy, PK traceur grandson will eat up HACKING TIMBUKTU. My only caveat to all young readers (even the girls who are NOT represented at all in this novel) is this: gold corrupts, even Arab and English boys who start out wearing white hats.


    -OOO- ... Read more


    89. Hacking Photoshop CS2
    by Shangara Singh
    Paperback: 454 Pages (2005-10-21)
    list price: US$29.99 -- used & new: US$3.61
    (price subject to change: see help)
    Asin: 0764597884
    Average Customer Review: 4.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    This is absolutely the ultimate guide to hacking Adobe’s wildly popular graphics software, written by an Adobe Certified professional photographer and designer.

    This is serious, down and dirty, tweaking – blowing away the default settings, customizing appearance, optimizing performance, customizing tools and offering readers total control over Photoshop like never before.  With these 300+ hacks, readers will find their work with Photoshop faster and easier than ever.

    Roll up your sleeves, and dive into these hacks including:

    • Faster Photoshop startup
    • Customizing the Photoshop interface
    • Hacking Photoshop’s Tools
    • Access hidden dialog buttons
    • Hacks for Masks, Layers, Paths, Curves and Selections
    • Camera Raw tricks

    and so much more. ... Read more

    Customer Reviews (9)

    5-0 out of 5 stars Not for New Users
    This is a good book for one who already has a working knowledge of CS2. It is nicely put together with lots of full color pictures and good explainations. If you are new to photoshop CS2 start with "Classroom in a Book" and go to "100 Simplified Tricks". Both of those take you by the hand and walk you through different projects until you become familiar with all or most of the tools. I got a good deal on this book in Amazons used catagory so I had to snap it up. All and all a GREAT book for the more experienced user.

    5-0 out of 5 stars Love the layout and approach
    Great stuff.Not a lot of fluff.Just good, straight forward tips.Presented in a concise way.Not for a beginner but even a modest user could greatly benefit from this book.

    5-0 out of 5 stars A Great At-Desk Reference
    Okay.You're not going to find everything about everything in here.And it's not going to cover just one topic in exhaustive detail.

    But I was able to find five different optimizations and hacks to increase my PS CS2 productivity within the first five minutes of opening this book!In the second chapter alone, in the day I've had this book, I've implemented eight of the tips to customize my work area.And I'm finding tips, tricks and hacks that allow me to do things I've wanted to learn and have searched for tutorials on through these last eight months.

    This book is worth the money.

    5-0 out of 5 stars Keep on Hacking!
    As a real world user from Photoshop 4 onwards, I find this book is a welcome change from the usual lists of tools etc and what they do. Hacking Photoshop, as it name suggests takes us under the bonnet and shows us all those hacks, shortcuts and clever little gizmos that we never even guessed were there. I know of no other books that explore the ins and outs of Photoshop so thoroughly and exhaustively, and what a difference to workflow whether hobbyist or professional, some of this knowledge makes, well worth the modest outlay.

    4-0 out of 5 stars Wheat and Chaff
    I like to think of Photoshop books as falling into three categories: process books, which take you through an entire process; cookbooks, that show you how to solve certain problems or achieve certain effects; and encyclopedias that discuss Photoshop tools and processes without reference to specific pictures."Hacking Photoshop CS2" falls into the last category.

    The book contains hundreds of tips, organized into chapters like "Optimizing Performance", "Hacking Layer Masks", and "Outputting to Print". While many of the tips are the kind that you would pick up in a process book, others are of the kind that most books miss.For example, like many other books, the author shows you how to apply ratings to images in Adobe Bridge.But he also provides a tip for quicker opening in Bridge of previews stored on a CD by exporting either the cache or sidecar files to the CD.Another new tip I encountered was a method for creating a new image with the same dimensions and color mode as an open image rather than the new image default.

    The question a reader will have to ask himself is whether it's worth wading through a lot of tips that may not be relevant to the reader to get to the one tip that will help him.I suspect that heavy Photoshop users will find it more useful to do so.I also note that most of the tips are probably more applicable to graphic designers than photographers.

    I was a little disappointed by some of the tips that weren't in the book.For example, in the discussion of optimizing performance, the author noted the importance of additional RAM to Photoshop but he didn't mention that if Windows users add more than two GB of RAM to their computers, Photoshop will only be able to access it if the 3 GB switch is set in the boot file.

    The author has also been a little sloppy.For example, in providing the location of the Photoshop preferences file in Windows, he has omitted one of the subdirectories that you must go through to get to the file.

    Still, for the serious user of Photoshop, there will probably be a few useful tips that will make this book worthwhile. ... Read more


    90. Hacking the TiVo, 2nd Edition
    by William von Hagen
    Paperback: 456 Pages (2004-07-31)
    list price: US$29.99 -- used & new: US$9.99
    (price subject to change: see help)
    Asin: 1592004814
    Average Customer Review: 2.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    The second edition of the successful "Hacking the TiVo" (1592001114) provides the latest information for TiVo owners got get the most out of the TiVo.This book discusses how to hack the latest TiVo hardware, including the Sony 4000, Pioneer 57H, and Pioneer 810H (updated Series 2 TiVos running on a new version of the TiVo operating system). These updates require additional techniques in order to expand storage capacity and install utilities into their file systes.Not only appealing to TiVo owners who want to save money, this book also serves owners who want the security of backing up their TiVos themselves, and Linux users who want detailed information about the version of Linux used in TiVos."Taboo" topics such as video extraction are also covered. ... Read more

    Customer Reviews (6)

    2-0 out of 5 stars not very useful
    can find most of the info on the internet only for those wanting to open up the tivo

    1-0 out of 5 stars Not very enlightening
    This book by the cover appears to be a very in-depth book when in fact it is meant to be a sort of text book. I have taught for over 4 years and this company was a primary source of text books. Over all their text books are of good quality, but leave a bit more to be desired. I found this book to be in-line with my history with this publisher. In fact if I had known that the book was by them I would not have purchased it for myself. That was my mistake for not paying closer attention.
    The book offers the typical level of information that I would expect from this publisher. It will provide enough information to dazzle those of you that are not so technically inclined, and may even impress you. For those that have a bit of technical knowledge. You will find the book basic and leaving you at a point where you will either want to know more, or are not sure if this book offered you any more information than you already knew.
    Anyone that is serious about finding out information about the Tivo box, the actual software, or remote hacking is pretty basic and offers no real interesting information that will really improve your Tivo experience. It offers information about changing the text and displaying information on the screen that really has no realavence, or benefit.
    As for the hardware hacking, this information may be interesting to someone that may be timid about opening the box. If you have any real computer experience, you could have figured most of this information on your own.
    In my best oppinion I would pass on this book. In fact if any other Tivo books are of similar quality I would save the money and find a good library to check it out for free. Even if it is late you will have still spent less than the shipping.

    3-0 out of 5 stars Excellent Book, Pathetic Editing
    As usual for the past 15 years, the editors were asleep at the wheel and completely hosed the vital (to brain-damaged Linux) command line arguments -- at least on page 39 (Chapter 2: Adding a Larger Hard Disk to Your TiVo).

    If you're transferring everything over to a larger hard drive using the "mfstool" commands the correct arguments are as follows (I've used "[space]" to indicate a single space between commands):

    mfstool[space]backup[space]-o-[space]-a[space]/dev/hdb[space]|[space]mfstool[space]restore[space]-i-[space]-C[space]/dev/hdd

    Idiot copyeditors and typesetters. Idiot editors in general.

    2-0 out of 5 stars System information
    The current, non-DirecTV system, updated by satellite, is actually 7.1 (as of 9 August 2005). I haven't found that any of the hacking books are especialy useful for Series 2 boxes, especially as the software upgrades.

    2-0 out of 5 stars DirecTV Tivo System-2 software Updates - now 6.1
    While this book contains some useful information for older Tivo boxes, the Series-2 has been Upgraded automatically by the Satellite to an even higher version. While the other reviewer, recently written, says it's now 5.3 and nobody has figured it out without actually tweaking hardware and reinstalling the chip (definately NOT recommended), the Software has already been upgraded again. As of now, 8/1/05, it is Version 6.1. ... Read more


    91. Take a Walk: 100 Walks Through Natural Places in the Puget Sound Region
    by Sue Muller Hacking
    Paperback: 256 Pages (2003-07)
    list price: US$16.95 -- used & new: US$3.95
    (price subject to change: see help)
    Asin: 1570613265
    Average Customer Review: 4.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    With this easy-to-use guidebook, expansive views of the Olympics, picnic lunches on bluffs overlooking Puget Sound, and the impeccable stillness of a wooded ravine can all be found within a half-hour drive of Everett, Seattle, Bellevue, Tacoma, or Olympia. Completely revised and updated, Take a Walk contains information on 15 new walks, additional tips for birdwatchers, more photographs, expanded parks information, and website addresses. Settings for walks detailed in this guide range from saltwater beaches to lakeshores to forests and meadows within the region's bounty of parks, preserves, and other lush, natural spaces. Each walk description includes a map and complete information about the setting, special attractions, length, level of difficulty, amenities, disabled access, connecting trails, dog restrictions, and surrounding flora and fauna. Details about play areas, interpretive trails, parking, picnic spots, and other park services are also provided. A calendar listing local organized walks for causes is included as an appendix. This indispensable guide to 100 nature walks in the Puget Sound region is perfect for walkers, birdwatchers, families, seniors, and joggers alike. ... Read more

    Customer Reviews (4)

    4-0 out of 5 stars Good review of Parks only
    This is a great book to acclimate yourself to the numerous parks around the Puget Sound area. There are so many parks to choose from that you get a great overview of each park and what it's best uses are for. I was interested in parks to go with my toddler so I particularly wanted this book to find choices that were kid-friendly, stroller-friendly, etc. Some of the parks have very extensive trails -- this book was handy in describing the terrain and scenery with tips and maps. The maps are a great resource in this book! Just keep in mind this book isn't for those looking for a hike up in the mountains or far away from civilization. Nor is every park included!

    5-0 out of 5 stars Take a Walk - Get out there! Inspiring
    I have a ton of walking, hiking, biking, cruising books around Puget Sound. This is by far one of the better ones I have acquired. I love its organization. It gives you the nitty gritty directions, what's there, quick map, features, all the basic stuff with only two pages per park. Its what I call my "idea" book. I'm in the mood but don't know where to go - I should check out a new park. This is the book. You can quickly thumb through it get inspired to check out a local park! I have been to several of the parks listed, and I found the information is accurate and informative. If you want more details with more pages pick up "Nature in the City of Seattle", A Mountaineers Book.

    4-0 out of 5 stars Great for Olympia, WA
    I used this book while temporarily living in Olympia, WA, and it was a great guide to experiencing the abundance of natural beauty around the small city.Most guide books on the state of WA only cover more obvious areas like Seattle or the Olympic National Rainforest or Mount Rainier."Take a Walk" is a great resource for walking trails in areas that are more off the beaten path.Also, the author provides helpful information regarding the description of the trails, difficulty level, handicap access, and directions.I can't vouch for the trails in areas outside of Olympia but, based on my experience, I would highly recommend this book as a useful, descriptive resource.

    3-0 out of 5 stars A good guide to Seattle parks
    Sue Muller Hacking's Take a Walk is a guide to some established trails in the Puget Sound region.The descriptions are concise, include a map and may include a black and white picture.The book summarises the highlights of the trail, other usage (e.g. bicycles), steepness, connecting trails, park services (e.g. restrooms, picnic areas) and whether there is disabled access.There is then a brief description of the trail (usually a couple of paragraphs) followed by directions to the park.

    This would be a good book for families with young children, because most of the parks seem to be "family friendly" and you will have essential information on facilities.You will also have 100 ideas of places to visit that are a short drive from Everett, Seattle, Bellevue, Tacoma or Olympia.

    I was rather disappointed with this book as I was expecting to find a book of short hikes on non-paved trails.I had the distinct impression that I could have put together a similar book by contacting the Parks and Recreation Department and asking them to send me flyers on each park.There is also a dearth of historical information.

    If you are new to Seattle and want a concise guide to the many different parks and trails of the region, then this book might be just what you are looking for.If you are a day hiker looking for some varied, challenging and interesting trails, look elsewhere. ... Read more


    92. Internet Security: Hacking, Counterhacking ,and Security
    by Kenneth Einar Himma
    Paperback: 304 Pages (2006-10-05)
    list price: US$66.95 -- used & new: US$6.03
    (price subject to change: see help)
    Asin: 0763735361
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    The Frequency Of Digital Attacks And Intrusions Has Steadily Increased Over The Years As The Number Of People With The Appropriate Motivation And Technical Ability Continues To Grow.Internet Security: Hacking, Counterhacking, And Society Is A Modern Survey Of The Recent Ethical Policy Issues Arising In Connection With Internet And Network Security.This Exciting Collection Of Papers, Articles, And Monographs Discusses A Number Of Important Ethical Questions Arising In Many Distinct Areas Of Internet And Network Security, Including: Are Hacker Attacks And Hacktivism Morally Justified? Is Hacking Justified As Self-Defense?How Should Professionals Respond To Security Issues?Is Publishing Malicious CodeProtected By Moral Rights To Free Speech?Is It Morally Permissible For The Government Or Individuals To Actively Conceal E-Content?Internet Security: Hacking, Counterhacking, And Society Is A Valuable Addition To The Library Of Anyone Concerned With The Growing Number Of Internet Security Issues And Intrusions Facing Society Today. ... Read more


    93. Hacking Exposed Linux, 3rd Edition
    by ISECOM
    Paperback: 614 Pages (2008-07-15)
    list price: US$49.99 -- used & new: US$26.45
    (price subject to change: see help)
    Asin: 0072262575
    Average Customer Review: 3.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description

    The Latest Linux Security Solutions

    This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders  and defend your Linux systems against catastrophic attacks.

    • Secure Linux by using attacks and countermeasures from the latest OSSTMM research
    • Follow attack techniques of PSTN, ISDN, and PSDN over Linux
    • Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
    • Block Linux signal jamming, cloning, and eavesdropping attacks
    • Apply Trusted Computing and cryptography tools for your best defense
    • Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
    • Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
    • Find and repair errors in C code with static analysis and Hoare Logic
    ... Read more

    Customer Reviews (9)

    1-0 out of 5 stars Not about hacking Linux
    When I was reading this book, I kept waiting for the topic to be Linux.The book starts with OSSTMM material.You can tell the OSSTMM folks have become too abstract to be concerned with the work-a-day security industry.This is not what I (or, I'm sure, anyone) will expect from a Hacking Exposed book.Imagine a book of definitions, but no examples; references to techniques, but no tools.

    The book features large tracts of discussion about OSSTMM, PSTN, ISDN, X.25, VOIP, Wireless (in general, not really Linux), RFID, web-apps (shouldn't that be its own book?), and C code static analysis.There's a whole chapter on hacking the users, without any real discussion of brute force attacks or tools you'd use to hack a Linux system.I was very disappointed.

    Where is discussion of kernel- and user-space?Where are hardware abstraction layer boundaries?What about exploiting stacks and heaps in Linux?What are the security implications of Linux dynamic libraries?What about hacking OpenSSH, Apache, Samba, X11, NFS, Kerberos, NIS and other common Linux services?

    If you're looking for hands-on Linux exploitation techniques, look elsewhere.

    1-0 out of 5 stars 1st and 2nd editions better
    hacking linux exposed 3rd edition is a complete rewrite and (in my opinion) loses the power of the previous editions.

    the first two editions have numerous examples of exploits followed by appropriate strategies for defending against them. the current edition is jargon and alphabet soup found within the field of security. about the only redeeming feature of the latest edition is a concise summary of security software for linux found in the appendix.

    i teach linux security (usually in the spring) and i know how difficult it is keep current with examples of exploits. what i demonstrate one year is unavailable the next! however, the red books really attempted to demonstrate the various vulnerabilities the blue book is generality and vocabulary.

    4-0 out of 5 stars Good book, but little news
    I had this on preorder, so I got it the moment it came out. If you are new to Linux security, this book is excellent. It talks about all the things you need to be aware of, and how to protect your systems. I would most definitely recommend it. Unfortunately for me, I knew most of this already. It did have some tidbits I liked, and the security recommendations are most definitely sound. I give it 4 stars, because I had expected more about hacking and less about securing.

    4-0 out of 5 stars Solid Information
    ISECOM, the renowned research organization for security, has again "made sense" of securing a Linux network against attacks. The book is a thorough guide to understanding how to "separate the asset from the threat" and block hackers from playing in the ultimate playground of Linux.The authors take you from the elements of security, to hacking the system, to hacking the users.

    What is particularly helpful are the case studies. If you or your company's employees need to travel and access your company's website via wireless connection, you'll be especially interested in the case study in Chapter Eight, where a hacker tracks a signal to a hotel's access point and creates legit-looking error pages in order to obtain the account information of the user. Also helpful are their usual attack and countermeasure icons, which further define how to pinpoint areas of risk.

    Security teams looking to evaluate their areas of vulnerability within Linux will be forearmed with the powerful arsenal of preventative approaches covered in this edition. All of the material is new, based upon the most recent and thorough security research. The hacking and countermeasure are based on the OSSTMM, the security testing standard, and cover all known attacks on Linux as well as how to prepare the system to repel unknown attacks. A great buy for the Amazon price of $31.49.

    4-0 out of 5 stars Fantastic Security Resource
    I found this book to have enough depth to assist in protecting your network and computer assets, but would have like to seen more specific examples in some cases.

    High Points:
    Circumventing Bios Passwords
    chrooting
    Fingerpring scrambling
    Secure Network Topology
    X.25 Information ... Read more


    94. A concise introduction to logic
    by Ian Hacking
     Paperback: 337 Pages (1972)

    Isbn: 039431008X
    Canada | United Kingdom | Germany | France | Japan

    95. Hacking: Digital Media and Technological Determinism (Digital Media and Society)
    by Tim Jordan
    Paperback: 200 Pages (2008-11-03)
    list price: US$19.95 -- used & new: US$14.22
    (price subject to change: see help)
    Asin: 0745639720
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies.

    One the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including:

    * Hacktivism; hackers and populist politics
    * Cyberwar; hackers and the nation-state
    * Digital Proletariat; hacking for the man
    * Viruses; virtual life on the Internet
    * Digital Commons; hacking without software
    * Cypherpunks; encryption and digital security
    * Nerds and Geeks; hacking cultures or hacking without the hack
    * Cybercrime; blackest of black hat hacking

    Hackers end debates over the meaning of technological determinism while recognising that at any one moment we are all always determined by technology. Hackers work constantly within determinations of their actions created by technologies as they also alter software to enable entirely new possibilities for and limits to action in the virtual world. Through this fascinating introduction to the people who create and recreate the digital media of the Internet, students, scholars and general readers will gain new insight into the meaning of technology and society when digital media are hacked. ... Read more


    96. Hacking Cyberspace (Polemics Series,) (Volume 0)
    by David J. Gunkel
    Paperback: 256 Pages (2001-03-16)
    list price: US$38.00 -- used & new: US$38.00
    (price subject to change: see help)
    Asin: 0813336694
    Average Customer Review: 3.5 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    In Information of Technology David J. Gunkel examines the metaphors applied to new technologies, and how those metaphors inform, shape, and drive the implementation of the technology in question. The author explores the metaphorical tropes that have been employed to describe and evaluate recent advances in computer technology, telecommunications systems, and interactive media. Taking the stance that no speech is value-neutral, Gunkel examines such metaphors as "the information superhighway" and "the electronic frontier" for their political and social content, and he develops a critical investigation that not only traces the metaphors' conceptual history, but explicates their implications and consequences for technological development. Through Information of Technology, David J. Gunkel develops a sophisticated understanding of new technology that takes into account the effect of technoculture's own discursive techniques and maneuvers on the actual form of technological development. ... Read more

    Customer Reviews (3)

    4-0 out of 5 stars Don't be so Literal
    Don't judge a book by its cover or even a cursory reading of its title.This book is only tangentially about computer hacking and hackers.Instead of examining the practices of hacking, this book itself functions as hacking.That is, it is a clever and resourceful investigation of computer technology that breaks into and re-purposes the texts and systems that comprise this thing we call "cyberspace."So instead of being a book about hacking, this book learns and uses the lessons of hacking to analyze and mess with information technology.Bottom line: If you are looking for a handbook about hacking or hoping to protect your network from a hack attack, this is not the book for you.But if you are looking for an insightful and eye-opening foray into the social, political, and philosophical aspects of computer technology, then this book is definitely something you will want on your bookshelf.

    3-0 out of 5 stars Well documented but...
    This book is good if you want to know more about the philosophical understandong of the cyberspace. It is well written and well documented. The major problem is that the author seems to be affraid to go deeper in the topics that he talk about. For example, he speaks about the cyberspace as a "real" space and a new one (Terra nova). But, he does'nt leave us with a strong argument on it.

    Still good if you want to know more on cyberspace and philosophy.

    4-0 out of 5 stars ConsequencesofHacking
    This book helped me to understand some of the consequences for hacking into things.It also helped me to undertsand that hacking can really cause very serious damage. Hacking may seem harmless but it isn't. Buy this book if your wanting to know some tactics some hackers use. It can help you get prepared for a hack attack. ... Read more


    97. Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier
    by Suelette Dreyfuss
    Paperback: 324 Pages (1997-06-06)

    Isbn: 1863305955
    Average Customer Review: 4.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan

    Customer Reviews (1)

    4-0 out of 5 stars Hacking from the Commonwealth
    This book provides a great overview of a number of computer intrusion incidents and links them throught not only the technical nature of the activity but the persons behind them.UNDERGROUND provides an excellent overview of intrustion activities focusing on the UK, Australia, and the United States.It covers the late 80's to the early nineties with stories on incidents such as the WANK Worm outbreak and 8lgm's activities.The stand out attribute of this book is that it examines what happened to the intruders after their activity rather than focusing on the activity itself.It also examines the interrelationships between intruders worldwide giving some insight into how the culture allows for several key persons to be involved in or have siginficant knowledge of many different activities.A must have to include in your library along with other staples such as Cuckoo's Egg, Masters of Deception, Fugitive Game, and Hacker Crackdown.However, like the other books noted, there are apt to be a few points that persons will take exception too with regard to accuracy. ... Read more


    98. Gray Hat Hacking : The Ethical Hacker's Handbook
    by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
    Paperback: 434 Pages (2004-11-09)
    list price: US$49.99 -- used & new: US$8.00
    (price subject to change: see help)
    Asin: 0072257091
    Average Customer Review: 4.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker’s Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position. ... Read more

    Customer Reviews (16)

    4-0 out of 5 stars Ordered used, looks new
    I ordered this book from Amazon, but the seller was Textbooksrus LLC.The description on Amazon.com said 'Used - Very good'.When I received the book, I couldn't believe it was used.I had to look through the pages a few times, because I thought maybe they sent me a new one by mistake.I guess it's Used.It looks like new to me.The price was right and the shipping was fast.I would give the seller Textbooksrus a 5 star rating.I gave the book 4 stars, because I haven't read it yet.It looks like some good technical information so far, judging by the table of contents and skimming a few chapters.Definitely more technical in depth than a 'For Dummies' book.

    4-0 out of 5 stars Great book
    What a great book.From no skillz to haxor writing shellcode, I'd recommend this to any academic institution wishing to teach on security.The first few chapters aren't overly exciting, but finding a book that gives fair coverage to topics like Linux shellcode development, client-side attacks on Windows, IDA pro usage, fuzzing, and more is no easy find!

    Great job guys!
    jrod

    1-0 out of 5 stars thisbook is a waste of good paper
    I have been condicting ethical hacking for 3 years and this book was such a let down,it falls well short in providing and good detailed content. Basically its the kind of stuff you learn on day 1 and shows no evidence of experience from an author who can hack into systems.My advise is save your money as this book covers nothing you wouldnt find on Google in 5 minutes. You know it is so bad I think I will write my own book.

    My advise google, wireshark, nmap and netcat the content you get it 5 minutes will be as good as this book.

    5-0 out of 5 stars Another revolutionary book from a revolutionary author!
    Now Listen...


    I know some of you look at these books as if it's a world of training people to be hackers. Now, maybe these books might create a few bad seeds, but they usually create a lot of good ones..

    This book is astounding, I bought this book because I love researching all about hacking, security, and protection. My major is computer science and I am hoping to be a professional white hat security professional, a hacker that is hired to show the flaws in sites.

    Now,when people see these books and say...this is madness!! books about hacking?!

    I think these books are great.They help you protect yourself, your computer, your company, your website, your server.

    This book shows a lot what hackers use...and the more you know about it, the better you can protect yourself.If you think that this trains bad hackers, well we cant change how some people use information.What I can tell you is that a lot of people will be better off with the information in this book for the companies and servers.

    This author is excellent!
    Great book!

    4-0 out of 5 stars A good guide for the beginner ethical hacker.
    There is alot of good knowledge to be learned in this book, but it is very cutthroat and dry. There are almost no "real world" examples of what they talk about, and alot of it talks about using programs that were created for linux.. Otherwise it is a good book, but I have read better. ... Read more


    99. Practical Hacking Techniques and Countermeasures
    by Mark D. Spivey
    Hardcover: 752 Pages (2006-11-02)
    list price: US$87.95 -- used & new: US$59.35
    (price subject to change: see help)
    Asin: 0849370574
    Average Customer Review: 5.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

    Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack.It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools.Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.

    Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures

    By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network. ... Read more

    Customer Reviews (2)

    5-0 out of 5 stars Instructor Review
    If you have dealt in the theory of Information Security and also would like to do some thing practical, this is one of the books that you should have. Since the practical tools, and their location on the web are continuously changing, the book should have a web site, where updates should be followed regularly. There is a web page for errors and/or changes . But that is not the point I would like to make, a live dynamic page for supporting the book. I have recommended the book in my cryptography/Network security course.

    5-0 out of 5 stars Above and Beyond
    I have read many Security books and this one goes Above and Beyond all the
    other books. All the Computer Security books I have read and seen teach
    theory and this one does that and then he shows you the proof in the pudding
    as he walks you through his Virtual Labs. ... Read more


    100. Hacking a Terror Network: The Silent Threat of Covert Channels
    by Russ Rogers, Matthew G Devost
    Paperback: 448 Pages (2005-02-10)
    list price: US$41.95 -- used & new: US$21.99
    (price subject to change: see help)
    Asin: 1928994989
    Average Customer Review: 3.0 out of 5 stars
    Canada | United Kingdom | Germany | France | Japan
    Editorial Review

    Product Description
    Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.

    Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.

    Cyber-Thriller focusing on increasing threat of terrorism throughout the world.
    Provides a fascinating look at covert forms of communications used by terrorists over the Internet.
    Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt. ... Read more

    Customer Reviews (10)

    1-0 out of 5 stars Terrible story, no plot, poorly researched
    How to write a book and make money: Find the hot topic of the day - today's is terrorism, put in your own pet theory or idea about the topic - the author's is how terrorists can use steganography to communicate and finally write a lot of fluff to combine the two. The author has written a poor story, thrown in liberal screenshots and lengthy explanation of how they work.

    The author knows enough about steganography but know little about the terrorists and their culture. Of course, today any fool can sell a book about "terrorism" and most do.

    1-0 out of 5 stars Pathetic nonsense
    I am quite familiar with steganography. This book is just a nonsense.
    Maybe, the fictional story could be worth of it, but how pathetic. She plans it all in detail. Then suddenly, she turns herself in to authorities, but does not get an idea to keep in contact with co-conspirators to help stop them.

    4-0 out of 5 stars Interesting and Provocative Story
    "Hacking a Terror Network" tells a convincing tale of Cyber Terrorism.This fictional story uses communication technology readily available today to spin a fascinating tale a potential scenarios for any criminal element and easy enough for the novice computer user.By combining emotional motivation and computer savvy, terrorist threats press US counterterrorism teams to keep ahead of electronic means of causing death and destruction.
    The only thing missing are sidebars describing instructional exercises for the reader to try out these easily used technologies.
    The reader might enjoy supplementing this book with another Syngress book, Zero-Day Exploit, to continue reading cyber terrorism scenarios.
    The author talks about applications to use and you don't even have to google them on the internet.They're included on the accompanying CD.Additionally, Syngress gives you 4 free e-booklets online.

    4-0 out of 5 stars Good intro to stenography and its uses.
    I found this book to be interesting both as a fiction and technical material.The plot develops around a very hot topic of these days - the war on terrorism. Unlike your "conventional" terrorists, the characters in this book use Internet and computer technology to secretly plan and launch an attack against the US.

    The tools discussed in this book were new to me, although I've heard of something similar in the past. I found it difficult at times to adjust to this interesting combination of suspense fiction and the technical explanations of how certain tools work.However, overall information obtained is quite useful and encouraged me to further research the topic of "covert channels" and stenography.Besides a few grammar errors and typos that were missed by the editors, this is a good introduction to stenography, especially for computer enthusiasts and professionals.If you are looking for a page turner fiction novel you may want to look somewhere else.

    3-0 out of 5 stars On The Internet They Won't Know You Are a Dog
    There are some important topics in cyber-security that are very important, but may not require an entire book to cover in detail. When it comes to online communication using "covert channels" and "stegenography", Syngress does what is excels at: they cover the topic in the context of a fictionalized narrative to give it a "real world" context. While not as excellent as some of their other efforts in this genre, Syngress still does a good, but not perfect, job with Hacking a Terror Network: The Silent Threat of Covert Channels (364 pages , SYNGRESS, 2005, ISBN 1-928994-98-9).

    The context of this book is a revenge-motivated terrorist attack, borne out of the first Gulf War, against targets on the United States. Some might question how realistic the scenario is or is not, but the book weaves a story which may ring all too true today. The threat of terrorism is real, and it could/would be too easy for people with evil purposes to use covert channels to plan and coordinate an attack.

    Without giving away a surprising plot twist, it is hard to envision how the scenario lain out in this book could be realistic, but then again no one on the streets envisioned 9-11 or the recent bombings in London either. What Rogers does in this book is effectively explain the different types of covert channels that can be used, tools that are readily available to use the channels, and tools that are available to detect their use. He also demonstrates that how, without a stroke of luck, it may be virtually impossible to detect the use of these channels.

    The book is not written as tautly as it could be and at times you might want to say "Just get to the point!". And there are some items in the book, such as the presence of an Internet Cafe in Iraq in 1991, that require as they say in Hollywood, the "willful suspension of disbelief". Put these things aside and you will learn some new things and technologies you may not have known about before.

    The bottom line is that without luck, nobody on the Internet will know you are a dog.

    The Scorecard

    Par on an Average Par 4 ... Read more


      Back | 81-100 of 100

    Prices listed on this site are subject to change without notice.
    Questions on ordering or shipping? click here for help.

    site stats