REVIEW - Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit


Title:

Hack Attacks Revealed

A Complete Reference with Custom Security Hacking Toolkit

Author:

John Chirillo

Publisher:

John Wiley & Sons (2001)

Pages:

960pp

Reviewer:

Francis Glassborow

Reviewed:

June 2001

Rating:

★★★☆☆


I think that most of us could benefit from reading Hack Attacks Revealed

The first of these two books is written largely on the principle that you should know your enemy. I guess some will be deeply perturbed by a book that actually publishes a program whose purpose is to crack a Unix encrypted password file. However stop a moment and think. How do we understand the threats to our systems if we choose to remain wilfully ignorant of the weapons of our opponents? However by the time you have finished reading this book and perhaps testing your local network you will be a very worried network manager (even if that is just a small domestic network at home).

Once you have finished the first book (even long before you have done so) you will be an easy sell on the second one. Here the same author deals with the other side of the coin, knowing how to stop the cracker. This is an excellent and informative book with one major flaw, if everyone follows the policies suggested by the author we again have what is substantially a monoculture so that the cracker who finds a way in to one system will have a rich reward in being able to access many.

As individuals, families and small businesses increasingly have networks that are connected to the Internet (and often on almost a continuous basis) it becomes more important for those of us from whom advice is often sought to at least understand the problems. If we are professionals outside the field of computer security we would probably be wise not to hand out too much advice. I think that most of us could benefit from reading 'Hack Attacks Revealed' and many would then want to read 'Hack Attacks Denied' but be careful that you do not unwittingly place yourself in a position of responsibility for the security of someone else's computer(s).

I recommend that you find time to read at least the first of these books.


Book cover image courtesy of Open Library.





Your Privacy

By clicking "Accept Non-Essential Cookies" you agree ACCU can store non-essential cookies on your device and disclose information in accordance with our Privacy Policy and Cookie Policy.

Current Setting: Non-Essential Cookies REJECTED


By clicking "Include Third Party Content" you agree ACCU can forward your IP address to third-party sites (such as YouTube) to enhance the information presented on this site, and that third-party sites may store cookies on your device.

Current Setting: Third Party Content EXCLUDED



Settings can be changed at any time from the Cookie Policy page.