Access "Hacking Exposed: Network Security Secrets & Solutions"
This article is part of the August 2005 issue of Betting the house on network anomaly detection systems
Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition) By Stuart McClure, Joel Scambray and George Kurtz McGraw-Hill/Osborne Books, 692 pages, $49.99 www.mcgraw-hill.com @exb Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition) @exe The original Hacking Exposed caused quite a controversy when it was published in 1999. Since then, the authors' "set a thief to catch a thief" approach has become the de facto method of an entire genre. The fifth edition, the first in two years, tries to refit the flagship title with a new arsenal of tools--but it comes up a bit short, literally. A lot has changed in the exploit world since the last edition, and the authors have had their hands full simply keeping the material current. Many chapters have been updated while still mentioning the reliable hacker standbys like the LSASS or PCT Windows vulnerabilities that still form the basis of today's botnets. The network footprinting chapter has undergone substantial revision. As domain registrars and IP address registries continue to make it ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
A Safe Bet?
Network anomaly detection is the newest player at the security table.
-
Boot Camp
Whip your users into shape with security awareness training.
-
Paper or PKI?
SAFE is a biopharmaceutical industry initiative to standardize credentials for drug discovery. It could save the industry billions.
-
Switching Lanes
Learn how to leverage the VLAN as a security tool.
-
Recent Releases: Security product briefs, August 2005
Learn about the security products released in August 2005.
-
Password Security
Symark Software's PowerKeeper 1.4
-
A Safe Bet?
-
-
Proving Grounds
Test labs are the ideal place to check theory against reality.
-
Hot Pick: Elemental's Elemental Compliance System 1.1
Elemental's Elemental Compliance System 1.1
-
Identity Management: Trustgenix's IdentityBridge Standard Edition
Trustgenix's IdentityBridge Standard Edition
-
Wireless security review: Juniper Networks' Netscreen-5GT Wireless
Juniper Networks' Netscreen-5GT Wireless
-
Hacking Exposed: Network Security Secrets & Solutions
Read a review of the security book Hacking Exposed: Network Security Secrets & Solutions (Fifth Edition).
-
Proving Grounds
-
Columns
-
Ping: Chrisan Herrod
Chrisan Herrod
-
Perspectives: Which security certification best meets your needs?
The pressure is on to earn security certifications to prove your worth.
-
Publisher's Note: Compliance 2.0
Learn about Compliance 2.0, which involves continuous process improvement.
-
On The Radar: NIST resources
Help from the Government
-
Ping: Chrisan Herrod
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO