This guide provides computer architects and engineers the information they need to design and implement security measures. It uses forensics-based analysis to give the reader insight into the mind of... This description may be from another edition of this product.
I am a senior engineer for network security operations. I read this book to learn best practices for improving the security of my enterprise. I was very pleased to learn that "Hack Proofing Your E-Commerce Site" (HPYES) was not another "hacking book," like so many published recently. HPYES offers a wealth of practical recommendations and solid guidance for anyone responsible for host and network security.Syngress' motto for their "Hack Proofing" series is "The only way to stop a hacker is to think like one." That slogan may be true for vulnerability assessment or penetration testing, but it does the material in HPYES a disservice. This book is less about the thrill of compromise and more about the measured peace of maintaining a well-protected enterprise. HPYES is noteworthy for its mature, reasonable, thorough, and clear approach to explaining security practices. The diagrams and screen captures are excellent. The seven authors consistently present topics through the security tenets of confidentiality, integrity, and [availability]. I believe even managers of technical staff would find this book rewarding.My favorite chapters discussed incident response (10), financial transactions (6), and policy (4). Chapters 6 and 10 were especially enjoyable, as they contained material I hadn't read elsewhere, like descriptions of electronic commerce technologies and a comparison of responses to web site compromise. (Imagine -- original material in a security book!)HPYES offered a few disappointments. I was dismayed to see an installation of Apache on Windows, vice UNIX. Page 336 mentions SSH as "Secured Socket Handler"; I believe the community knows SSH as simply Secure Shell. Chapter 7 also suffered from awkward English, but compensated by introducing Nessus as a sample vulnerability assessment tool. Appendix B was probably not needed, as it's just a reprint of "Fast Track" material from individual chapters.Overall, I recommend HPYES to anyone responsible for enterprise network security. This book won't receive the manufactured hype of books like "Hack Attacks Revealed" or "Hack Attacks Denied," but you will quickly recognize the HPYES authors are both skilled practitioners and effective educators.(Disclaimer: I received my review copy free from the publisher.)
Have yours signed at Blackhat/Defcon
Published by Thriftbooks.com User , 23 years ago
Great book, for overall penetration testing, vulnerability assessment - even policy development.Good for managers and technical people alike.Hunt Brent down at Blackhat/Defcon and pester him to sign your copy.
Great book for anyone who has, or wants, an eCommerce site
Published by Thriftbooks.com User , 23 years ago
Anyone with an eCommerce site can benefit from this book. Especially if you have been concerned whether you have covered all of the potential vulnerabilities associated with such sites. It is quite comprehensive in the treatment of risks, vulnerabilities, threats, and how to mitigate them. It is not a How-To book. You won't find absolute answers for firewall configurations and bandwidth requirements. It won't even tell you how to run UNIX commands or code HTML pages. What it does address is the fact that you need to ask the questions. Then it helps you determine the right answers for your site. It certainly helped me become aware of some things I had missed.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.