Summary of Hacking Exposed
Network Security Secrets and Solutions
Computer hackers are invisible thieves, stealing your information, time and attention. But you can learn enough to protect yourself.
You might expect a massive book about computer hacking to be tedious reading, but - surprise - this one is actually fun. You’ll be impressed by the quality of the writing and the authors' clarity about complicated matters. Why have these clever writers gone public with information on how to hack into computers? They figure that hackers learn how to penetrate systems anyway. It’s the network administrators and other professionals who need to understand hacking to protect their own vulnerabilities. The book, which is a bit dated now, given the programs it refers to, still conveys relevant principles about defending your work and your company from attack. getAbstract recommends it as an essential reference for businesspeople who want to know why system administrators always look twitchy. It’s also a good tool for any computer professional whose day - or career - might be ruined by a single moment of system weakness.
In this summary, you will learn
- Which steps hackers take to break into computer systems
- How to protect yourself against them and make your system more secure
- Why you should know and publish information about your system’s weaknesses
About the Authors
Stuart McClure and George Kurtz are president/CTO and CEO, respectively, of Foundstone Inc. (www.foundstone.com), of which Joel Scrambray is a principle. The firm provides information system security consulting services to clients ranging from members of the Fortune 50 to newly minted startups. McClure, who has more than ten years of IT and security experience, specializes in security assessments, firewall reviews, e-commerce application testing, host reviews, PKI technologies, intrusion detection, and incident response. Kurtz, an internationally recognized security expert, has performed hundreds of firewall, network and e-commerce related security assessments.
Comment on this summary
1 year ago...
2 years agoA bit dated.
2 years agoWhile most of the key takeaways are still relevant, a technical security book published in 2001 is of limited value in 2014; many of the technologies covered are now obsolete.
Contained in Knowledge Pack:
Knowledge PackSecurityHow to protect your company from hackers, thieves, and even terrorists.
Customers who read this summary also read
P.W. Singer and Allan Friedman
Oxford UP, 2014
James M. Kaplan et al.
W.W. Norton, 2016