How do these hackers find my Windows network? What info can they get? How do they actually "connect" and compromise my system? Can I do anything about it? Will it be hard, expensive or will I have to hire somebody or maybe will just a firewall do? What is this netbios thing anyhow? If you have questions like this then this book is for you. Hacking Windows 2000 Exposed is not a book about building a bastion host, configuring...
0Report
I've read a number of Win2k Security and hacking books, and up to this point have been uniformly unimpressed. Most of these books talk about the theory behind various security concepts, such as how Kerberos works, how IPSec works on the packet level, etc. While this is important information, it doesn't help the working network engineer and admin with the practical aspects of securing the enterprise network.Hacking Exposed...
0Report
I am a senior engineer for network security operations. I read "Hacking Exposed Windows 2000" ("HEW2K") to learn how adversaries compromise Windows hosts. Like the original "Hacking Exposed" (now in a third edition) and the newer "Hacking Linux Exposed," HEW2K delivers no-nonsense, high-impact security information. I give all three books my highest recommendation. Having read the original "Hacking Exposed" in Oct 99, I...
0Report
Extremely well organized and presented in an easy-to-grasp way, Hacking Windows 2000 Exposed will have the novice's jaws dropping, yet even the seasoned Win2K expert will raise an eyebrow (or both). The latest hacks and cracks are explained in detail, allowing the admin to really and truly see what they are up against and why security is so important to ANY computer attached to a network. I highly recommend that before you...
0Report
Now here is one of these books that you just GOTTA have. If you only buy one or two books a year, this is one of them. Remember how enthused I was about the original "Hacking Exposed" in W2Knews? Well, they have done it again, but now with an all-Windows 2000 focus. This is the end-all of hacking into your W2K servers. A must-read if you want to secure your networks and a 'Stu's Warmly Recommended!' I'm holding a fresh copy...
0Report