- Shopping Bag ( 0 items )
Posted February 24, 2003
Found this book to be more informative than others in this field. From SQL injections to how to use an electron microscope to retrieve overwritten information, this book gives great detail in how to hack internal server systems. Chapter 3 is of particular importance to administrators. I recommend this book.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 13, 2002
I liked this book
The book makes a good case for using penetration testing (ethical hacking) as a part of the overall security program. And it is a good place to start in developing the skills and process for performing ethical hacking internally. Chapters 2.2 and 3 are must reads for any company who plans to hire someone to do a penetration test for them. I recommend this book....that's my two cents.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.