BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Digital Business & Culture - Hackers

1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$32.99
1. Gray Hat Hacking : The Ethical
$29.67
2. Google Hacking for Penetration
$32.99
3. Hacking Exposed 5th Edition (Hacking
$32.99
4. Real Digital Forensics: Computer
$19.79
5. Ubuntu Hacks: Tips & Tools
$32.97
6. Stealing the Network: How to Own
$19.77
7. Hacking the Cable Modem: What
$26.37
8. Hacking: The Art of Exploitation
$18.15
9. The Art of Intrusion: The Real
$11.02
10. The Art of Deception: Controlling
$32.99
11. Hacking Linux Exposed, Second
$32.99
12. Certified Ethical Hacker Exam
$59.46
13. Digital Evidence and Computer
$18.15
14. Spies Among Us: How to Stop the
$34.64
15. Firewalls and Internet Security:
$57.00
16. Computer Forensics and Cyber Crime:
$26.39
17. Wi-Foo: The Secrets of Wireless
$23.07
18. Apache Security
$31.49
19. The Unofficial Guide to Ethical
$18.87
20. Essential PHP Security

1. Gray Hat Hacking : The Ethical Hacker's Handbook
by McGraw-Hill Osborne Media
Paperback (09 November, 2004)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072257091
Sales Rank: 10381
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (12)

5-0 out of 5 stars i love GHH
i have read tonnes of books on this subject.starting from secrets of a super hacker by knightmare(published way back in 94, trust me dat was a great read n even 2day i find myself glued to da back as the first time i read it.now coming back 2 gray hat hacking.this is wat i would like 2 call the hacking reference book for the next generation.every one concerned about security should consider picking up this book.u might as well save some money n picking up more knowledge than any of the hacking exposed books in the market.no this book is not for button clicking script kiddies who play around wid trojans n claim to be hackers or web defacers(lamers).if u belong to da breed of script kiddies pick up this disgustin book by ankit fadia (oh by the way ive reviewed it).i wouuld liek to congradulate the authors for the outstanding work put into this book.howeever it would be great to see expanded materials on various topics and a little more detail in tool description.its not bad but it could still be better.so as i said before get dis book u wont regret it.so kiddies grow up keep those hacking exposed n ankit fadias books apart throw em in da firplace burn em do anythin .but go get dis one
4-0 out of 5 stars Covers more than the typical hacking book
"Gray Hat Hacking - The Ethical Hacker's Handbook" is not your normal hacking book.This book should not be lumped in with the "Hacking Exposed" series nor the likes of "Counter Hack".What differentiates Gray Hat Hacking (GHH) from other books is the amount of code the book offers.This book is not for script kiddies, but instead shows how to advance to the next level of hacking (and, more importantly, prevention) by devoting over 100 pages to developing programming skills for both Linux and Window exploits.I had not encountered a book that dedicated this much space to scripting.
5-0 out of 5 stars Great buy for every IT dept.
I bought this book from a store in D.C, and read it on my way back to India. I was impressed. Never found any book that deals with computer security and software vulnerabilities written so well. The reason I like this book is than others is because it does not only give you information that can help you in assessing your network security, but also gives you a basic introduction to the laws and legal technicalities. The contents of this book cover most of computer/network security related areas including technical implementation, planning, and defense. Therefore, it is not only for system engineers, but also for people managing IT departments.
Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Security - General    5. Computers / Security    6. Data security & data encryption    7. Network security   


2. Google Hacking for Penetration Testers
by Syngress Publishing
Paperback (14 December, 2004)
list price: $44.95 -- our price: $29.67
(price subject to change: see help)
Isbn: 1931836361
Sales Rank: 14354
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (20)

4-0 out of 5 stars got the warm-fuzzy i was looking for...
I work for a Forture 500 company that is upgrading intranet Search capability using Google Appliance.I bought this book to help determine what risks Google Appliance might expose.The book begins with good overview of the basic Google interface and includes tips for searching.I then expected to get the low-down on hacking using Google.What i discovered was somewhat anticlimactic, there really aren't any serious hacks to be had using Google.Obviously, you must be careful about web-content publishing processes.Also, Google is respectful of content you don't want crawled or exposed (using both Internet Search and intranet appliance).
4-0 out of 5 stars Best-of-class book at using the power of Google!
Syngress's "Google Hacking for Penetration Testers" (GHPT) by Johnny Long demonstrates to average Joes the power of Google.The author is the authority on how to use Google to recon an intended target.Considering the narrow focus of the subject, the book is able to thoroughly dissect the various tools and weapons Google offers.Certainly, this book is not admitting anything not already known in the hacking world, but the books does provide a valuable asset as a one-stop-shop at using Google.
5-0 out of 5 stars That is a lot of info!!!
It has everything you NEED to learn how to hack w/ using something as simple as Google.i never in my life would have thought you could get that much server info and vuln. info with just using Google.Johnny knows his stuff and this is a must have if you are a novice hacker that wants to stem-away from the title; "script-kiddie", this book will help you.Thanks to the authors for this great release. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computers    4. Internet - Browsers    5. Internet - General    6. Computer / Internet    7. Computer fraud & hacking    8. Computers / Internet / Browsers   


3. Hacking Exposed 5th Edition (Hacking Exposed)
by McGraw-Hill Osborne Media
Paperback (19 April, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072260815
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

A lot of computer-security textbooks approach the subject from adefensive point of view. "Do this, and probably you'll survive a particular kindof attack," they say. In refreshing contrast, Read more

Reviews (82)

5-0 out of 5 stars Information Security
I had to purchase this book for college but it is a great read. One of the only textbooks that I have used that was actually interesting. They give clear examples and make it easy to follow thier explanations. Great book if you want to learn about hacking and some of the issues it involves.

3-0 out of 5 stars Still solid but redundant and a bit tired
I cannot say anything more that other positive reviews have not already said.
3-0 out of 5 stars Good, but aging
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Computer Security    7. Data protection    8. Internet - Security    9. Networking - General    10. Security - General    11. Security measures    12. Computer Communications & Networking    13. Computer fraud & hacking    14. Computers / Security    15. Data security & data encryption   


4. Real Digital Forensics: Computer Security and Incident Response
by Addison-Wesley Professional
Paperback (23 September, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0321240693
Sales Rank: 24501
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars Excellent Read
This book is written in such a style that is easy to understand, yet technical and detailed enough to maintain your interest and attention all the way through.
5-0 out of 5 stars This one is a keeper!
As an author and instructor, I tend to be pretty picky about the books I choose to read and use in my classes. The authors present the material in a good logical progression. I especially like that it also provides sample evidence on the DVD. Most of the computer forensic books that currently exist contain mostly theory. This is the first good hands-on text that I have seen.
5-0 out of 5 stars An essential A-Z guide for forensic investigations
There is a real lack of well written books in this category, and this one stands out because it is comprehensive, yet easy to digest and carefully laid out, including case studies to understand data capture and analysis techniques.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Crime    4. Computer Data Security    5. Computer crimes    6. Computer networks    7. Computer security    8. Computers    9. Internet - Security    10. Investigation    11. Security measures    12. Computers / Internet / Security    13. Data security & data encryption   


5. Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux (Hacks)
by O'Reilly Media
Paperback (14 June, 2006)
list price: $29.99 -- our price: $19.79
(price subject to change: see help)
Isbn: 0596527209
Sales Rank: 5174
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (8)

4-0 out of 5 stars Good book for Ubuntu users
As a new Ubuntu linux user (about 1 year experience) I found this book to be extremely useful.
3-0 out of 5 stars Where is the CD?
A good intro for Linux novices. Lot of hacks, but the idea of Ubuntu is that you really do not need hacking... Anyway, if one hack can save you a day of learning the wrong ways, it'd be worth it. As the book is written for beginners, one wonders why there is no CD with it...

5-0 out of 5 stars a useful reference to get up to speed on Ubuntu
I found this book a very useful howto to get up to speed in using Ubuntu and Linux in general. I loved the section on installing ATI and Nvidia drivers in Ubuntu as well as some of the multi-media hacks which has only helped to get more out of this os.
Read more

Subjects:  1. Computer Books: Operating Systems    2. Computers    3. Computers - Operating Systems    4. Linux    5. Operating Systems - Linux    6. Operating systems (Computers)    7. Ubuntu (Electronic resource)    8. Computers / Operating Systems    9. Computers / Operating Systems / Linux    10. Unix, Unix Linux & Unix TCL/TK    11. linux, Ubuntu, Debian, hacking, dapper, gnome, linux desktop, hacks   


6. Stealing the Network: How to Own the Box
by Syngress Publishing
Paperback (01 April, 2003)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 1931836876
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Read more

Features

  • Illustrated

Reviews (31)

5-0 out of 5 stars Entertaining in it's own right...
The Stealing the Network series of books is in a catagory on it's own. Thrilling, entertaining, and fun to readjust scratches the surface of these books. I'll recommend this book to anybody, from joe sixpack who only uses the internet for games and pr0n to mitnick himself.
4-0 out of 5 stars Useful, readable illustration of computer security concepts
_Stealing the Network: How to Own the Box_ has 10 stories with a first person narrator, who is either an attacker, or in two cases, a defender.While the characterization isn't up to the standards of (good) commercial fiction* in most cases, it makes the technical medicine go down easier and gives a picture of who and why people do this stuff.That picture is useful in making an abstraction feel more like a concrete threat.
3-0 out of 5 stars Rough writing, but interesting
The writing needs some help -- I understand the newer books are edited by an actual writer to smooth out the prose a bit.
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer networks    4. Computer security    5. Computers    6. Computers - Communications / Networking    7. Internet - Security    8. Networking - General    9. Security measures    10. Computer hackers    11. Computers / Communications / Networking    12. Computers / Networking / General    13. Computers / Security    14. Cyberterrorism    15. Data security & data encryption    16. Security    17. Management Information Systems   


7. Hacking the Cable Modem: What Cable Companies Don't Want You to Know
by No Starch Press
Paperback (10 September, 2006)
list price: $29.95 -- our price: $19.77
(price subject to change: see help)
Isbn: 1593271018
Sales Rank: 63333
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (5)

3-0 out of 5 stars Interesting, informative, and more than just schematic after schematic
I expected this book to be much more technical than it was. Rather than a collection of schematics and wiring diagrams, DerEngel combines many personal stories with the results of his work. It's quite an interesting read, although I don't know if the book will make hardware hackers out of anyone. Some people may be able to hack their modems with the ready-to-use tools the author discusses, but most people probably aren't going to want to potentially destroy their modems by cracking open the case and messing with the circuit board components. Most of the discussion takes it for granted that the reader is already be familiar with basic electrical engineering and Radio Shack. The tools he uses are Windows programs, so unix users may need to find similar tools to follow along with the hacks.
5-0 out of 5 stars Smart reverse engineering methods to enhance ANY embedded device !!
. 5-0 out of 5 stars Coverage of a subject not often thought about...
Have you ever wondered what is inside that device called a cable modem?And if you're a real geek, have you ever wondered what you might be able to do with/to it in order to "modify the performance"?Then this is your book...Hacking the Cable Modem - What Cable Companies Don't Want You To Know by DerEngel.This is very detailed information on everything you'd ever want to know...
Read more

Subjects:  1. Computer Books: General    2. Computer hackers    3. Computers    4. Computers - Communications / Networking    5. Data Transmission Standards And Protocols    6. Data Transmission Systems - Broadband    7. Handbooks, manuals, etc    8. Hardware - Peripherals    9. Modems    10. Networking - General    11. Cable modem, uncap, uncapping, hacking, hack, DerEngel, TCNiCO, broadband    12. Computers / Communications / Networking    13. Computers / Data Transmission Systems / ISDN   


8. Hacking: The Art of Exploitation
by No Starch Press
Paperback (October, 2003)
list price: $39.95 -- our price: $26.37
(price subject to change: see help)
Isbn: 1593270070
Sales Rank: 36921
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (36)

5-0 out of 5 stars Excellent insight, without being boring
This is an excellent book, and it helped me a lot in understanding the basic techniques of hacking.
5-0 out of 5 stars Awsome Work
This is one of thosw rear books that get five stars from me. The book is very straigntforward: it is short, it is free of unnecessary explanations, it is pretty detailed and well organized. The book assumes you know quite a bit about computers in general and low-level OS organization in particular. It gives a plethora of interesting examples to try out, so even if you're not particularly interested in the low-level detailes of how a certain trick works, you still remain in the zone by simply applying those examples.
5-0 out of 5 stars this is great stuff
not for total beginners though. author recommends having a gentoo setup. ... Read more

Subjects:  1. Computer Books: General    2. Computer hackers    3. Computer networks    4. Computer security    5. Computers    6. Computers - Computer Security    7. Internet - Security    8. Security - General    9. Security measures    10. Computers / Computer Security    11. Computers / Security    12. Data security & data encryption    13. Security   


9. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
by John Wiley & Sons
Hardcover (04 March, 2005)
list price: $27.50 -- our price: $18.15
(price subject to change: see help)
Isbn: 0764569597
Sales Rank: 19259
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (28)

3-0 out of 5 stars Interesting if you can get past the horrible writing....
This guy is definitely a geek and NOT an English major.The stories are interesting and frightening if you can get past the constant run on sentences and poor grammar.Good luck.

5-0 out of 5 stars Must read for anyone with an interest in computer security
While these stories describe different exploits they all provide different lessons and are from that POV well worthwhile.Several of the stories are quite funny (the hacked Coke machine for instance--the password jumped out at me as soon as they said no one could ever guess it) but still worth while.There is too much tendency to depend on hardware solutions when folks don't realise that those are computers too and they can be hacked just as easily or even more so than a PC.Some of the stories are probably exaggerated as Mitnick admits he was unable to verify all of them particularly the shorts at the end of the book.Some of chapter 10 is probably exaggerated but I used to do pen tests and its certainly overall credible.A very valuable book overall.I can sympathise when some of the "white hat" security experts turn vigilante and deface websites etc. out of frustration.The reason that I left the field was because often my big decision after an audit was "do I just dust off the report I did 2 years ago or do I write a new one" because more often than not nothing had changed and none of the holes had been plugged.Most of the times I wrote a new report were because new vulnerabilities had been added.

4-0 out of 5 stars Art of Intrusion Review
Written by Kevin D. Mitnick and William L. Simon, The Art of Intrusion is a unique book showcasing true short stories submitted by hackers telling about the various hacks they have done. With everything from cheating at Las Vegas casinos to breaking into bank computer systems, the book is both educational and entertaining. After each story, ex-hacker Kevin Mitnick gives advice on how to prevent intrusions like the ones described in the book from happening to you or your business, as well as some insight on why the systems were so vulnerable in the first place. It is like a suspense novel for the computer-savvy. If you want to be entertained and learn something new each time you pick up the book, you can't go wrong with The Art of Intrusion. ... Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer hackers    4. Computer security    5. Computers    6. Computers - Computer Security    7. Computers - General Information    8. Security - General    9. Computer fraud & hacking    10. Computers / Security   


10. The Art of Deception: Controlling the Human Element of Security
by John Wiley & Sons
Paperback (17 October, 2003)
list price: $16.95 -- our price: $11.02
(price subject to change: see help)
Isbn: 076454280X
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Read more

Reviews (107)

3-0 out of 5 stars Interesting cons, but repetitive and ego-trippy
Mitnick has his own reputation to live up to with this book, which sets a pretty high bar for the audience who knows him as the "World's Most Notorious Hacker."Unfortunately, while he knows the material cold, his skills as an author are less stellar.
3-0 out of 5 stars Very interesting book
This book seriously highlights the stupidity of people in the world. It shows how clever people go very far by asking basic questions to get what and where they want. The samples are entertaining and worth reading. This is some great education for the naive people of the world.

3-0 out of 5 stars Entertaining but weak in writing skill and quality of advice
I enjoyed the first more-than-half of the book which dealt with various kinds of social engineering attacks.Each was at least plausible and usually interesting.I was constantly aware, however, that the titles of the chapters only vaguely correlated to the examples given: there must be a better way to structure the content (possibly starting with defining various kinds of attacks then identifying those techniques as they come up in the examples.)
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer Science    4. Computer hackers    5. Computer security    6. Computers    7. Computers - Computer Security    8. Computers - General Information    9. Computers And Society    10. Information Management    11. Information technology    12. Security - General    13. Social aspects    14. Computers / Security    15. Data security & data encryption    16. Network security    17. Privacy & data protection   


11. Hacking Linux Exposed, Second Edition
by McGraw-Hill Osborne Media
Paperback (04 December, 2002)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072225645
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

"Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Read more

Reviews (41)

5-0 out of 5 stars Ding, Ding, We have a winner.
First, this book does _NOT_ have a installation walk through...YES!!!
5-0 out of 5 stars Must-Read Info For Linux Admins
The Hacking Exposed books have set the bar for this genre of security book. Hacking Linux Exposed - 2nd Edition doesn't fail in meeting that bar as well. If you've read Hacking Exposed - 4th Edition and think this book can't tell you anything you don't already know- think again. For those who administer Linux boxes this book provides an in-depth look at specific hacks and vulnerabilities unique to the Linux operating system and the accompanying fixes and workarounds to protect yourself. The book is overflowing with examples and sample commands that users can immediately put to use to better understand the risks and how to mitigate them. Hacking Exposed is a must-read for security- this book is a must-read for Linux security.
5-0 out of 5 stars Don't have this book?You're BEGGING for trouble...
When I first starting using Linux systems and putting them online I had NO idea what sort of grief I was in for.The reason for that grief: I had NO clue how to 'harden' a system or what that term even meant.By not knowing that I put upsystems that were quickly exploited by script kiddies and SPAM houses looking for open relays to use for SPAM and for 'zombies' to use in Distributed Denial of Service (DDoS) attacks.I bought this book, read it, and haven't had those problems since.If you are going to do *anything* with Linux on the internet then GET THIS BOOK NOW.Unless, of course, you *want* to have your computers destroyed on a weekly basis... ... Read more

Subjects:  1. Computer Books: Integrated Systems    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Operating Systems    6. Linux    7. Networking - General    8. Operating Systems - Linux    9. Operating Systems - UNIX    10. Security - General    11. Unix (Operating System)    12. Computers / Security    13. Data security & data encryption    14. Network security    15. Unix, Unix Linux & Unix TCL/TK   


12. Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing))
Paperback (07 April, 2006)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0789735318
Sales Rank: 28388
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Better than Offical Material
If your studying for the CEH exam or just want to learn more about ethical hacking and security this book is a must have.
5-0 out of 5 stars Great book for beginning System and Network administrators.
If you are a beginning System or Network administrator, this is a great introductory security book to start with.
4-0 out of 5 stars Good Book
This is a good book, but you need to have the official courseware because dont cover all topics deeply. ... Read more

Subjects:  1. Certification Guides - General    2. Computer Books: General    3. Computers    4. Computers - Certification    5. Networking - Security    6. Security - General    7. Tests    8. Computers / Technical Skills    9. Computing and Information Technology   


13. Digital Evidence and Computer Crime, Second Edition
by Academic Press
Hardcover (08 March, 2004)
list price: $69.95 -- our price: $59.46
(price subject to change: see help)
Isbn: 0121631044
Sales Rank: 70258
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (10)

5-0 out of 5 stars Excellent book from a real expert
This is an excellent book from a real expert.5-0 out of 5 stars The book of digital crime
If you are new to this world this is where you should begin. Digital Evidence contains all the knowledge one could amass by obtaining PHD in computing. Especially when you don't have time for a Diploma. I have bought 5 books pertain to digital crime from USA and UK. But this is the one and only book I am recommending to any one in any continent who want to learn or new to this arena. All the other books in this field for Attorneys or with similar requirements are some what academic and may be boring.The CD-ROM accompanying the book gives you much needed hands on training, otherwise which will cost you at least US $ 4000, if you are to go to a training centre to do the same.

5-0 out of 5 stars Best computer forensic book available
Sometimes, defense attorneys have it easy: one slip-up by the prosecution and evidence is thrown out. Knowing that, law enforcement goes to great lengths to ensure that evidence is appropriately collected and protected. That works well in the physical world, where law enforcement has many generations' worth of experience. But in the modern world of computers and digital networks, where the simple act of rebooting a computer is enough to wipe out large amounts of evidence, law enforcement clearly needs thorough guidance. Read more

Subjects:  1. Computer Books: Internet General    2. Computer crimes    3. Computers    4. Computers - Computer Security    5. Evidence, Criminal    6. Forensic Science    7. Internet - Security    8. Networking - General    9. Security - General    10. Computer fraud & hacking    11. Medical / Forensic Medicine   


14. Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day
by Wiley
Hardcover (08 April, 2005)
list price: $27.50 -- our price: $18.15
(price subject to change: see help)
Isbn: 0764584685
Sales Rank: 52443
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

4-0 out of 5 stars Fun and enlightening read
Ira Winkler's "Spies Among Us" finally cleared my head on the subject of ... oooh, so horrible ... " cyberterrorism." Intuitively, when you read about "cyberterrorism" you instantly think "what a load of bull", but the amount of press and "research" that you see coming about it, makes one wonder. As a result, I was somewhat confused about the subject.Until now! Ira's book finally cleared it: at this stage, "cyberterrorism" is positively, absolutely, 100% "bull product." Here is why: computer failures are an accepted thing. "Everybody knows" that computers "are flaky", and might crash at any time, taking your work (or a billion-dollar Martian probe :-)) with them. Thus, computers do a pretty good job damaging themselves and things around them, and, thus, people will not be terrified if it happens due to malicious actions by whatever cyber-terrorists. Now, the above obviously doesn't cancel the use of computers and the Internet by the terrorists, but this is not what is commonly understood as "cyberterror."
5-0 out of 5 stars This Book Is Right On Target
In the first couple of chapters, I realize that this is not a novel of spy vs.spy, but an actual resource book that makes 100 % sense.
5-0 out of 5 stars Wake up managers!
Read this book to appreciate what is (or should be) keeping your Information Security Manager awake at nights, and to understand what he/she probably wants (or ought) to do about it.
Read more

Subjects:  1. Business intelligence    2. Computer Books: General    3. Computer crimes    4. Computers - Computer Security    5. Computers - General Information    6. Espionage    7. General    8. Leadership    9. Prevention    10. Security    11. Security - General    12. Self-Help    13. Terrorism    14. Computers / Security    15. Data security & data encryption   


15. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
by Addison-Wesley Professional
Paperback (24 February, 2003)
list price: $54.99 -- our price: $34.64
(price subject to change: see help)
Isbn: 020163466X
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Essential information for anyone wanting to protect Internet-connected computers from unauthorized access. Includes: Read more

Reviews (21)

5-0 out of 5 stars What, you don't own this?
You should buy this book.Then you should read this book.

4-0 out of 5 stars A great overview, but a little thin on details.
This book is an excellent comprehensive introduction to computer security from policies to technologies.However, as pointed out by other reviewers, the depth of content when it comes to specifics is rather shallow, but one must take into account that to discuss each of these topics in depth would require volumes of text, and much of the specific information can easily be found in texts devoted specifically to those individual topics or from online sources.Given the breadth of information discussed, I think it strikes a very effective balance in displaying the information necessary to understand the basics of computer security.
5-0 out of 5 stars Good upgrade to a classic
This second edition has all the qualities the first edition had 10 years ago: Their writing is clear, they provide a sober assessment of the costs & benefits of various services (as opposed to other reviewers, I don't think the authors had much of an anti-Microsoft bias, just a realistic perspective on where Windows products are regarding security). The book is still fairly compact and it comes with an excellent biography and pointers to security software. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Data Security    4. Computer security    5. Computers    6. Firewalls (Computer security)    7. Internet - General    8. Networking - General    9. Security - General    10. Computer fraud & hacking    11. Computers / Internet / Security    12. Data security & data encryption    13. Internet    14. Network security    15. Privacy & data protection   


16. Computer Forensics and Cyber Crime: An Introduction
by Prentice Hall
Paperback (01 August, 2003)
list price: $57.00 -- our price: $57.00
(price subject to change: see help)
Isbn: 0130907588
Sales Rank: 269290
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

5-0 out of 5 stars Great undergraduate book
This particular book by Britz, is but one more example of her commitment to detail in all of her works.Like her previous books, this book is both readable and comprehensive.It is one that I myself have adopted in my computer crime course, and I am anxiously awaiting the second edition.The chapters on the legal issues and the history of computer crime are unparalleled in the extant literature.More succinctly, the greatest strength of the book is its' sheer readibility. Designed for undergraduates, this particular text is a must read for any beginner interested in computer crime and computer investigations.Unlike other books in the field which prove to be far too advanced for novices, Britz's book allows even the most unsophisticated reader to appreciate and understand the problems associated with the investigation of computer crime, as well as recognize emerging trends in this area.Please, please, provide a second edition as soon as possible!!

5-0 out of 5 stars Well Done
"Computer Forensics and Cyber Crime," written by Marjie T. Britz and, publish by Pearson Education Inc., seems to be a very well balance book, why? It just took me few minutes, between reading the introductory notes and "browsing" to its chapters, to understand that this book is well sequenced and organized.
2-0 out of 5 stars Sadly Dated
This would have been a superb book if it had been published in 2001 or so.Coverage is wide and quite detailed -- unfortunately, it appears the research for the book was done in 2000 (that's the publication date of the msot recent references in the bibliography)and a lot of things have changed since then.
Read more

Subjects:  1. Computer Books: General    2. Computer Crime    3. Computer crimes    4. Computer security    5. Computers    6. Criminology    7. Forensic Science    8. Legal Reference / Law Profession    9. Security - General    10. Crime & criminology    11. Social Science / Criminology   


17. Wi-Foo: The Secrets of Wireless Hacking
by Addison-Wesley Professional
Paperback (28 June, 2004)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0321202171
Sales Rank: 28194
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (16)

5-0 out of 5 stars The secrets of Wireless Hacking
An excellent resource both for the novice as well as for the advanced user of WLAN. If you work professionally with wireless LAN you should own this book.

5-0 out of 5 stars Excellent book
I think everything that needed to be said has been said by Richard. This is an excellent book for those who want to get their hands dirty with Wireless Security. One of the areas in IT that will never die down, not anytime soon at least, is security. IT security is especially HOT right now, and a lot of companies are paying more attention to what they should have years ago. In my home city, Philadelphia, there is a project called Wireless for Philly that is supposed to bring wireless connection to everybody. Now, while people see that as just another development in this great city, I look at it as an opportunity for people who are smart enough to protect this kind of network. This book does the job. I am going to suggest that if you know you are not going to have time to dedicate to this book, don't pick this book up. You're better off! Because if you do pick this book up, it's going to be hard to put it down.

5-0 out of 5 stars *The* Source for Wireless Security Information
I was recently given the book Wi-Foo, The Secrets of Wireless Hacking as a present for my birthday, and I have been reading it extensively for the past few days. I have been involved with wireless security for a few years now, giving security talks to members of my community and helping out friends and family stay secure while enjoying the wonderful advantages of wireless computing. Over the past couple of years, I have slowly built up a small reference library of books related to wireless technologies and security. I even got involved in a small antenna building hobby which enabled me to better understand some of the ways RF works.
Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Computers - General Information    5. Security    6. Security - General    7. Computers / Internet / Security    8. Data security & data encryption    9. Network security   


18. Apache Security
by O'Reilly Media
Paperback (15 March, 2005)
list price: $34.95 -- our price: $23.07
(price subject to change: see help)
Isbn: 0596007248
Sales Rank: 17720
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (10)

5-0 out of 5 stars The single best Apache security book in print
I recently received copies of Apache Security (AS) by Ivan Ristic and Preventing Web Attacks with Apache (PWAWA) by Ryan Barnett.I read AS first, then PWAWA.Both are excellent books, but I expect potential readers want to know which is best for them.The following is a radical simplification, and I could honestly recommend readers buy either (or both) books.If you are more concerned with a methodical, comprehensive approach to securing Apache, choose AS.If you want more information on offensive aspects of Web security, choose PWAWA.
5-0 out of 5 stars Excellent book...
This book is worth every single dollar. The examples are very clear and also provide invaluable information about security.
5-0 out of 5 stars Review of "Apache Security" by Ivan Ristic
Excellent book.The chapters on PHP and logging are especially useful. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Books: Internet General    4. Computers    5. Computers - General Information    6. General    7. Internet - Security    8. Internet - World Wide Web    9. Computer / Internet    10. Computer networks    11. Computer programs    12. Computers / Internet / Security    13. Network security    14. Security measures    15. Web servers    16. Web sites    17. apache ,apache security ,security ,hacking ,web applications ,database security ,application security ,web application security ,hardening apache ,apache lock down   


19. The Unofficial Guide to Ethical Hacking (Miscellaneous)
by Course Technology PTR
Paperback (02 February, 2002)
list price: $49.99 -- our price: $31.49
(price subject to change: see help)
Isbn: 1931841721
Sales Rank: 109452
Average Customer Review: 2.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (44)

1-0 out of 5 stars Not as 1337 as it seems
I bought this book thinking that I might learn something new about how to protect my computer.After reading the first little bit I realized I already knew all of it because it was all already on the internet.Pretty much this guy got all of the (basic) tutorials for hacking on the internet and compiled them into a book.Also, almost nothing in this book will work if you have minor network security.All the people that gave this a 5 star rating are not very smart.They are impressed because some tough 1337 hacker told them how to crack into systems wreck havoc.Yeah, right.Save the money and read tutorials on the internet.Do not buy.

1-0 out of 5 stars oh no ankit fadia again....
wat is wrong wid all these people who are givin 5 star reviews to books written by l33t ankit fatia.cant u people see this is thrash.which respectable hacker would include chapters like changing ur windows 95 logon screen in their book,none besides the great ankit fadia,other cheap materialinclude outdated hacks n winblows 98 tricks.dis lama material was at times so boring dat even even my 11 yr ol bro who has just started outlearning bout hacking copuldnt stop laughing and complaining how boring dis read was.is he out of his mind wat was he thinking when he wrote this crap ,did he think its gonna help secure networks and ah windows 95 for ur hacks .why not tell people to get a linux distro fagg maybe ubuntu,mandrake,suse these r secure fatia and for god sake grow up from windows 95.i guess fadia doesnt really care bout all this , hes out there making money just becoz we have stupid kids buying these booksn think dey gonna hack the planet.from books to certifications to video seminars ,fadia is taking everybody for a ride.wonders wats planned next maybe a music video or dvd by mr fadia1-0 out of 5 stars Garbage
The book has nothing but garbage. Most of the vulnerabilities hes talking about have been fixed ages back. And all this stuff is free on the net. Especially the windows registry hacking is horrible. Hes just stolen the ones that fancied him and made it into a chapter. You'll get thousands of such tricks on the net. I wonder how the publisher had the nerve to publish this stolen junk and charge so much for it.
Read more

Subjects:  1. Computer Books: General    2. Computer hackers    3. Computer networks    4. Computer programming    5. Computer security    6. Computers    7. Computers - Communications / Networking    8. Computers - Computer Security    9. General    10. Internet - Security    11. Networking - General    12. Security - General    13. Security measures    14. Computers / Programming / General    15. Data security & data encryption    16. Network security   


20. Essential PHP Security
by O'Reilly Media
Paperback (01 November, 2005)
list price: $29.95 -- our price: $18.87
(price subject to change: see help)
Isbn: 059600656X
Sales Rank: 32427
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (12)

5-0 out of 5 stars PHP Security is a HUGE topic
This book is essential for anyone starting out in PHP, but not only for them. It offers tips for almost any skill level, maybe you know some of the ways to keep your site secure but Chris really goes in depth on some of them.
5-0 out of 5 stars VERY VERY HIGHLY RECOMMENDED!!
Are you a developer who is writing insecure PHP code? If you are, then this book is for you! Author Chris Shiflett, has done an outstanding job of writing a practical book that will help you improve your PHP application-level security.
5-0 out of 5 stars Essential for the Beginner or Advanced PHP developer
As a very security conscious developer, I found this book to be a GREAT resource to my library. Though the book is short in length, it is very rich in content. Chris does a GREAT job of presenting the problem (citing specific examples of the exploits), showing the pitfalls, and then presenting the solutions.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Books: Internet General    4. Computers    5. Information Technology    6. Internet - Security    7. Internet - Web Site Design    8. Mesures    9. PHP (Computer program language)    10. Security - General    11. Security measures    12. Sites Web    13. Sâecuritâe    14. Web sites    15. Computer / Internet    16. Computers / Internet / Security    17. Computers / Security    18. Computers/Security - General    19. Data security & data encryption    20. PHP Security Handbook, php, security, web, application, programming,configuration, hacks, attacks, exploits, vulnerabilities, mysql, apache, php 5, Chris Shiflett    21. World Wide Web (WWW)   


1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top