Author: Stuart McClure, Joe Scambray, George Kurtz
ISBN No: 0-07-219382
Review date: 17/12/2025
No of pages: 730
Publisher: McGraw Hill
Year of publication: 11/09/2012
Brief:
Hacking Exposed is a security and risk manager's guide on network security and solutions for preventing the increasing practice of hacking.
Hacking Exposed (third Edition). Network Security Secrets and Solutions.
The three authors are well respected in the field of IT security. We are all vulnerable when connected to the vital business enabler, the internet. A disregard for security can present many potential opportunities for skilful hackers. The authors are right in pointing out that there is no simple answer to provide total security. However the authors do provide clear security strategies that if implemented will go along way to bring about effective security. The authors refer to known examples of hacking and the trauma, damage and loss that have occurred to businesses. Included are details of new attacks on Windows 2000 Windows XP/NET server and on 802.11 wireless networks. Firewalls are discussed with the authors arguing they are far from a security panacea. They examined ways to detect and prevent attacks. There’s updated material on voice mail systems hacking and much more within the 700-plus pages. This excellent, interesting read provides vital information in protecting a company’s valuable assets held on computers’ including of course home computers and lap tops. We all realise hackers can be prosecuted; however to date this is a rare occurrence. Until there are more prosecutions, where is the deterrent? The most important deterrent is to implement the common sense advice supplied in this publication to reduce insecurity to the lowest possible. The main threat to security remains an attack on the computers’ communication network. As systems advance so do the hackers knowledge, to get ahead of the hacker is essential. The authors of this publication clearly state how to do this. A CD-Rom is supplied with useful network analysis and key security tools to install with links to the security tools covered in the book.





