Summary of Hacking Exposed

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Hacking Exposed book summary


9 Overall

10 Applicability

8 Innovation

9 Style


You might expect a massive book about computer hacking to be tedious reading, but - surprise - this one is actually fun. You’ll be impressed by the quality of the writing and the authors' clarity about complicated matters. Why have these clever writers gone public with information on how to hack into computers? They figure that hackers learn how to penetrate systems anyway. It’s the network administrators and other professionals who need to understand hacking to protect their own vulnerabilities. The book, which is a bit dated now, given the programs it refers to, still conveys relevant principles about defending your work and your company from attack. getAbstract recommends it as an essential reference for businesspeople who want to know why system administrators always look twitchy. It’s also a good tool for any computer professional whose day - or career - might be ruined by a single moment of system weakness.

In this summary, you will learn

  • Which steps hackers take to break into computer systems;
  • How to protect yourself against them and make your system more secure; and
  • Why you should know and publish information about your system’s weaknesses.

About the Authors

Stuart McClure and George Kurtz are president/CTO and CEO, respectively, of Foundstone Inc. (, of which Joel Scrambray is a principle. The firm provides information system security consulting services to clients ranging from members of the Fortune 50 to newly minted startups. McClure, who has more than ten years of IT and security experience, specializes in security assessments, firewall reviews, e-commerce application testing, host reviews, PKI technologies, intrusion detection, and incident response. Kurtz, an internationally recognized security expert, has performed hundreds of firewall, network and e-commerce related security assessments.



Why Experts Believe in Open Disclosure
If you base your computer security on knowledge about the vulnerabilities of your computer system, your security will be stronger. Publishing information about the vulnerabilities of popular computer systems has its risks, of course, but that information...

Comment on this summary

  • Avatar
  • Avatar
    David Wolf 3 years ago
  • Avatar
    Brian Starnes 4 years ago
    A bit dated.
  • Avatar
    David O Keeffe 4 years ago
    While most of the key takeaways are still relevant, a technical security book published in 2001 is of limited value in 2014; many of the technologies covered are now obsolete.

More on this topic

Contained in Knowledge Pack:

  • Knowledge Pack
    How to protect your company from hackers, thieves, and even terrorists.

Customers who read this summary also read

More by category