BN.com Gift Guide
Customer Reviews for

Security Warrior

Average Rating 4.5
( 2 )
Rating Distribution

5 Star

(1)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
Page 1 of 1
  • Anonymous

    Posted April 22, 2004

    Eye-opening

    The whole concept of this book is: know your enemy. If you are a software developer or systems administrator, something you touch is bound to be attacked. Software developers need to understand this when writing programs. Likewise, systems administrators must protect their system from outside attack. This book proceeds from the premise that attack is inevitable, but we are more effective in dealing with it if we know the tactics of hackers. As we understand how they think and act, it helps us write and maintain a higher level of security within applications or network infrastructure. This book is very interesting to read and amazing to see how easy it is to ¿hack¿ various kinds of applications with just a few tools. The book discusses the basics of reverse engineering on Windows, Linux, and Pocket PC. Additionally, the authors step through a couple of examples, to show just how easy it is to bypass entering a serial number in a software install. Other ¿hacks¿ shows include buffer overflow, TCP/IP, SQL injection attacks, and even social engineering. I would recommend this book to anyone interested in any kind of software or network security. It is very eye-opening to see just how easy it is to compromise a system. Once you know how your enemy attacks, you can proceed with ways to combat them.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 18, 2004

    Different Approach to Computer Security

    This book shows a different perspective on computer security, the perspective of the cracker trying to attack or invade your computer system or network. And why not? The best offense sometimes is a good defense. Among the topics this book talks about? It describes how you can 'reverse engineer' your own programs (In Windows 9X, XP, etc. UNIX and Linux) and also shows in some cases how easy it is for hackers and crackers to invade your computers and networks. And speaking of UNIX, this book also how easily UNIX boxes can be compromised, or how easily Windows machines can be (which given the recent news about another XP security hole, seems almost redundant for the book's authors to mention). It shows that even Linux can be quite insecure, proving that no OS is completely safe just that it may be safer than Unix or Windows. Just on these points alone, the book is an eye-opener. The chapters about 'reverse engineering' also made me think about how handheld devices like Palm Pilots can also be attacked and/or infected with virii or worms, once they are connected to the Internet. No computer device is truly immune. Among other chapters with good information? Ones about social engineering, attacks on various platforms (Unix, Windows Client & Windows Server, SQL and Wireless) and methods of defense against them. This book has a ton of outstanding information that may scare the heck out of security professionals, but is designed truly to inform. It offers security professionals new ways of defending against attacks and viruses.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews
Page 1 of 1