Get 40% off Hack Attacks Revealed Second Edition at
http://www.amazon.com/exec/obidos/ASIN/0471232823/tigertools

The primary difference between this second edition and the original Hack
Attacks Revealed, aside from some rectified errata, is approximately 300
pages of over 170 new exploits, advanced discovery techniques, malicious
code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II
and more, current vulnerabilities, advisories, and hacking labs with
additional illustrations, and techniques for routers, operating systems
(including Windows 2000/Pro and XP, Solaris, LINUX), and server software
daemons. You'll also find a special chapter dedicated to the Top 75 Hack
Attacks. 

To accommodate the new material, most of the extraneous information,
lists, and some source code was moved from the book to the CD-ROM. In
addition to the new material, you'll find a special FULL LICENSE release
of the complete internetworking security toolkit. This kit contains
modules to discover, scan, penetrate, expose, control, spy, flood,
spoof, sniff, infect, report, monitor, and more, plus a special 60-page
usage and user guide. 

What readers say:

5/5 Stars, Computer security made simpler......
Reviewer: Kelly Larsen from Augusta Georgia  

I have been teaching Windows 2000 and Unix security for the U.S. Army
for 3 years. I am constantly searching for a book that will provide true
insight into the hacker mindset and methods. Most books dawdle in the
routine and well known hacks and still leave you wanting. "Hack Attacks
Revealed, 2nd edition", takes you to the next level. It is the single
best security reference book that I've seen.

You rarely find a book that provides indepth coverage of Windows, Unix,
and Linux security. Hack Attacks Revealed's information, tutorials, and
tools provide you with everything you would need to test and secure a
computer system or network. As a bonus, the fully licensed TigerSuite
Professional (version 3.5) is included on the accompanying CD. This is
an amazing grouping of tools to analyze and test the security of a
computer network. In class, I routinely use TigerSuite to demonstrate
security shortfalls. My students are so impressed that they immediately
ask me where I got it and how can they get it. 

"Hack Attacks Revealed" has something for every skill level, whether it
is teaching you how to subnet, compile a security tool or walking you
through a buffer overflow. The First edition was great and John Chirillo
found a way to go it one better. 


-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.

Reply via email to