Full description not available
W**O
Read it with admire...
I am a Linux lecturer.And I like to read those books about Hacking and Security.Most of the books are not that easy to read.Because writers assume that their readersmust have a strong background on those issues.Sometimes they just throw you the answer without explaination.But this book really makes a difference.It gives you the situation, makes you to think at first.And then you can read the answers at the back,review your original point of view.And every example it providesshow us a possible breach in reality.Not those theory-based stories...Wanna secure your system?Just READ IT!! No matter buy it or borrow it...
A**T
I learned from these and they are still the best
Once upon a time I consumed and cherished these books... now I look back on them fondly and still recommend them.Now, I keep buying extra copies of these for other people. Though a few years old they are an excellent resource as is and great for poaching scenarios from as well.
B**R
great
great book series, was sent what was ordered in a reasonable time period with minimal ware on the used book.
A**L
Good, but scenarios getting out of date
The Challenge/Solution style of these books are great for security beginners as well as seasoned professionals. If you read carefully you can pick up many hints/tools which you can use in real life security scenarios.My only -ve comment about this book is its getting out of date now. Many of the incidents described are not relevant now, as security practices at most firms would thrawt these incidents. Having said that, the scenarios are still good for security beginners. For advanced readers I would suggest the Second edition or the soon to be released third edition.
J**N
An Incredible Opportunity to Srutinize Actual Case Studies!
Along with advances in computer and Internet technologies we have also witnessed countless unlawful attempts to break into computer systems around the world with the intent to steal, damage, or otherwise compromise information.Hacker's Challenge by Mike Schiffman offers readers an incredible opportunity to scrutinize actual case studies of intrusion attempts - those attempts to gain unauthorized entry into computers systems to cause deliberate harm or mischief.Hacker's Challenge is broken up into two sections - 20 actual case studies with actual attack scenarios and log files (names and data have been changed for legal and confidentiality concerns), and corresponding solutions to them. Readers are challenged to read the case studies and determine for themselves how the attacks were made, what vulnerabilities were exploited, what harm, if any, had occurred, how to lesson the impact of future intrusions, and what possible remedies can be made to prevent future attacks altogether.Readers will learn how to determine the levels of attacker technical abilities and sophistication used. The case studies cover a broad range of attacks - those perpetrated by "script kiddies" who use existing attack code made available on the Internet and using publicly known attack methods, clever and skilled attackers who use publicly known coding and write their own code, and extremely skilled attackers who use publicly known coding, who write their own code, and who take advantage of non-public exploits and cutting-edge technologies to accomplish their evil work.Of further interest, the case studies and solutions presented in Hacker's Challenge will demonstrate how company officials and security consultant team members can effectively respond to different kinds of intrusion attempts. Their methods of discovery - much like police detective work, are fascinating, detailed, and very professional. Readers will follow along with them step-by-step to determine the order of events, to search log files and research events for clues, to think through issues for themselves, and arrive at their own conclusions. The solutions at the back of the book provide detailed answers, intrusion prevention measures, and a wealth of additional resources for further consideration.An added benefit of this book is that readers will learn about the skills involved in this kind of detective work, such as knowing about software programs and operating systems, knowing their particular vulnerabilities and exploits, knowing programming languages, reading log files, piecing together details, searching computer systems, searching buildings, interviewing suspects and witnesses, consulting with computer security experts, and putting to use essential people skills to obtain helpful information.Hacker's Challenge also presents readers with some valuable lessons to be learned - by learning from the mistakes of others. The case studies point out a number of system weaknesses that can be easily exploited to gain access to computer systems - including the keeping of system software default settings, using dictionary word passwords, failing to install the latest program versions, failing to install updates and security patches in a timely manner, failing to use anti-virus and intrusion detection programs, failing to use an appropriate firewall, failing to filter ports, failing to use appropriate encryption, failing to properly set radio strength - for wireless systems, and failing to either remove or disable unneeded programs and services on Web servers.Hacking poses many problems for a lot of people. Consequences of someone breaking into a computer system can affect the lives of many people - embarrassing downtime, lost revenue, stock market reactions, unemployment, public health and safety. Vigilance is key here - keeping up on the latest vulnerabilities and exploits, using the latest software versions and patches, and incorporating other necessary security precautions. This book will greatly benefit any company or person involved in handling information technology issues. It's also ideally suited for classroom and workshop use!
R**X
Challenging!
Hacker's Challenge is a must have for every computer forensics. The scenarious given are indeed technically challenging and I like the fact that the complexity of attack, prevention, and mitigation are already specified. It is also very helpful as it make references to external resources that contain more info about a particular specified vulnerabilities. The log files, network maps, etch are very helpful in making a forensic analysis. I look forward to getting the new version. Cold Eyes
W**E
Real-World Security IQ Test
Mike Schiffman's book, "Hackers Challenge," is a very innovative approach towards computer security learning and skill assessment. Guiding the reader from evidence, to reasons, to how and why, and to the end results of a hack attempt, this book provides a blueprint for pursuing and examining the forensic evidence of an attack. This book cohesively brings together all aspects of a hacking event into 20 separate incidents that will guide the reader towards the ultimate answers but only if you have the ability to see the forest from the trees. If you have the skills to recognize the attacks this book will provide confirmation of your abilities along with items of interest you may have missed. If you are left wondering what all the evidence adds up to, this book will get you as close to the on-site experience as possible that most dry manual or reference books do not provide.For any system administrator this book provides an invaluable way to test your talents and expertise against real-world hacking events in a safe environment using multiple hardware and software products. This book is a must-have for anyone serious about the security of their systems and their ability to recognize and thwart hackers before, during and after an attack. I highly recommend this book for the beginner looking to build their abilities to a veteran looking to confirm or update their skills.
Trustpilot
3 weeks ago
1 day ago