You might expect a massive book about computer hacking to be tedious reading, but - surprise - this one is actually fun. You’ll be impressed by the quality of the writing and the authors' clarity about complicated matters. Why have these clever writers gone public with information on how to hack into computers? They figure that hackers learn how to penetrate systems anyway. It’s the network administrators and other professionals who need to understand hacking to protect their own vulnerabilities. The book, which is a bit dated now, given the programs it refers to, still conveys relevant principles about defending your work and your company from attack. getAbstract recommends it as an essential reference for businesspeople who want to know why system administrators always look twitchy. It’s also a good tool for any computer professional whose day - or career - might be ruined by a single moment of system weakness.
In this summary, you will learn
- Which steps hackers take to break into computer systems;
- How to protect yourself against them and make your system more secure; and
- Why you should know and publish information about your system’s weaknesses.
About the Authors
Stuart McClure and George Kurtz are president/CTO and CEO, respectively, of Foundstone Inc. (www.foundstone.com), of which Joel Scrambray is a principle. The firm provides information system security consulting services to clients ranging from members of the Fortune 50 to newly minted startups. McClure, who has more than ten years of IT and security experience, specializes in security assessments, firewall reviews, e-commerce application testing, host reviews, PKI technologies, intrusion detection, and incident response. Kurtz, an internationally recognized security expert, has performed hundreds of firewall, network and e-commerce related security assessments.
Comment on this summary
4 years ago...
4 years agoA bit dated.
4 years agoWhile most of the key takeaways are still relevant, a technical security book published in 2001 is of limited value in 2014; many of the technologies covered are now obsolete.