Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Ethical hacking and penetration testing guide
Baloch R., Auerbach Publications, Boston, MA, 2014. 531 pp. Type: Book (978-1-482231-61-8)
Date Reviewed: Jul 1 2015

Any book with “hacking” in the title is bound to evoke some interest and curiosity. The term has been overused in good and bad ways. Some of the world’s best programmers are considered the best hackers, and so are the evil people who break into computers for monetary or espionage reasons.

This book is meant for white hat hackers who protect companies by seeing patterns and identifying attacks. One needs to know how a black hat hacker attacks systems to thwart it. This book is a comprehensive one, with 12 long chapters. It starts off with fundamental concepts, explaining various aspects of the jargon, and goes in depth into Linux systems.

Any good hacker needs to know the innards of the Unix system, and Linux is a popular variant of the operating system. The theory behind various concepts is also explained, such as transmission control protocol (TCP) handshakes and scans. All of the commands and sample screen shots are given. I wish they were given in color and not in black and white, which is sometimes hard to read due to contrast.

Some of the vulnerability scanners and sniffing packets are addressed in detail. Again, for any good hacker, understanding packet captures is must-have knowledge. A lot of practical hacks are explained, and the book goes into the mechanics in detail. One example is exploiting cross-site scripting (XSS). What it takes, how a hack is conceived, what information is gathered, how packets flow, and how to reverse-engineer are all explained in detail.

Overall, this book is a great source for students and security professionals alike. Readers can deepen their knowledge by using the concepts explained in the book and get a good sense of security hacks and how to prevent them. The book takes an in-depth look at the concepts and doesn’t gloss over them at the surface level. I highly recommend it to any budding security engineer.

More reviews about this item: Amazon, Goodreads

Reviewer:  Naga Narayanaswamy Review #: CR143573 (1510-0852)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Testing And Debugging (D.2.5 )
 
 
Linux (D.4.0 ... )
 
 
Security and Protection (D.4.6 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Testing And Debugging": Date
Software defect removal
Dunn R., McGraw-Hill, Inc., New York, NY, 1984. Type: Book (9789780070183131)
Mar 1 1985
On the optimum checkpoint selection problem
Toueg S., Babaoglu O. SIAM Journal on Computing 13(3): 630-649, 1984. Type: Article
Mar 1 1985
Software testing management
Royer T., Prentice-Hall, Inc., Upper Saddle River, NJ, 1993. Type: Book (9780135329870)
Mar 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy