Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills Review

Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Average Reviews:

(More customer reviews)
Not an Exam Cram type of book, this book is aimed at giving newcomers to the security field a solid background and understanding of what the job entails. Only incidentally does this book follow the CompTIA Security+ certificate examination (Exam #SY0-101) recommendations and thus provide a dual purpose.
The book is organized into tenphases or major sections. Each phase then has a series of Tasks to be performed. The first phase is entitled 'The Grunt Work of Security.' In it you start by making a security assessment of your network. By phase 10 you have completed hardening, securing the storage, set up user accounts, protected against virus and other malware attacks and more. In phase 10 you study troubleshooting.
I found the book to be easy reading, and the phase/task approach worked well for me. It provides a well needed break in the reading. And let's face it, reading about security is a lot less exciting than reading about Harry Potter.

Click Here to see more reviews about: Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

A step-by-step guide to the tasks involved in security administration
If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience.
In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA's Security+ SY0-301 exam.
Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience
Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter
Features tasks that are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users
Ideal hands-on for those preparing for CompTIA's Security+ exam (SY0-301)

This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals.

Buy NowGet 34% OFF

Click here for more information about Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills

Read More...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking Review

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
Average Reviews:

(More customer reviews)
I bought Krutz's first book on CISSP prep and found it to be very readable and made difficult concepts more easily understood, at least enough for me to pass my CISSP certification. So far I'm 40% into this text and the same formula is holding true. A good aid for prepping for the CEH.

Click Here to see more reviews about: The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking


The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests


Buy NowGet 37% OFF

Click here for more information about The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

Read More...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems Review

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Average Reviews:

(More customer reviews)
To use "American Idol" lingo, you've already read reviews by Randy Jackson and Paula Abdul. It's time for the truth from Simon Cowell -- Practical Packet Analysis (PPA) is a disaster. I am not biased against books for beginners; see my five star review of Computer Networking by Jeanna Matthews. I am not biased against author Chris Sanders; he seems like a nice guy who is trying to write a helpful book. I am not a misguided newbie; I've written three books involving traffic analysis. I did not skim the book; I read all of it on a flight from San Jose to Washington Dulles. I do not dislike publisher No Starch; I just wrote a five star review for Designing BSD Rootkits by Joseph Kong.
PPA is written for beginners, or at least it should be intended for beginners givens its subject matter. It appears the author is also a beginner, or worse, someone who has not learned fundamental networking concepts. This situation results in a book that will mislead readers who are not equipped to recognize the numerous technical and conceptual problems in the text. This review will highlight several to make my point. These are not all of the problems in the book.
p 21: This is painfully wrong on multiple levels: "When one computer needs to send data to another, it sends an ARP request to the switch it is connected to. The switch then sends an ARP broadcast packet to all of the computers connected to it... The switch now has a route established to that destination computer... This newly obtained information is stored in the switch's ARP cache so that the switch does not have to send a new ARP broadcast every time it needs to send data to a computer." This misconception is aggravated on p 62 in the discussion of ARP.
p 65, Figure 6-5: The TCP three way handshake is not SYN - ACK - SYN.
p 78, Figure 7-3: The TCP three way handshake is not SYN - ACK - ACK.
p 79: Packet 5 is not "the packet that was lost and is now being retransmitted." Packet 2 is.
p 80: There is no "ICMP type 0, code 1 packet."
p 85: This boggles the mind: "Immediately after that ARP packet, we see a bunch of NetBIOS traffic... If that other IP address wasn't a sign that something is wrong, then all of this NetBIOS traffic definitely is. NetBIOS is an older protocol that is typically only used as a backup when TCP/IP isn't working. The appearance of NetBIOS traffic here means that since Beth's computer was unable to successfully connect to the Internet with TCP/IP, it reverted back to NetBIOS as an alternate means of communication -- but that also failed. (Anytime you see NetBIOS on your network, it is often a good sign that something is not quite right.)"
p 85: This "troubleshooting" example highlights the different default gateways for Barry and Beth as being the "biggest anomaly" causing Beth's computer to not work. The author ignores the fact that Barry and Beth have computers with the same MAC addresses.
p 89: Traces recorded at a client and server are compared. The author says "The two capture files look amazingly similar; in fact, the only difference between the two files is that the source and destination addresses on the SYN packets have been switched around." Good grief.
p 106: Another "troubleshooting" scenario wonders if a "slow network" problem is related to the fact that tracerouting out from a host fails to produce a response from the router. However, the traceroute continues past the router, so connectivity exists (missed by the author). He says "we know our problem lies with our network's internal router because we were never able to receive an ICMP response from it. Routers are very complicated devices, so we aren't going to delve into the semantics of exactly what is wrong with the router."
pp 107-8: Yet another "troubleshooting" issue wonders why seemingly "double packets" are seen while sniffing on a host. The author wonders if "misconfigured port mirroring" could be the problem, ignoring his statement that the trace was collected on the host in question. He doesn't notice that each "double packet" has a unique MAC address pairing, i.e., packet 1 involves 00:d0:59:aa:af:80 > 00:01:96:3c:3f:54 and packet 2 involves 00:01:96:3c:3f:a8 > 00:20:78:e1:5a:80. Assuming 00:d0:59:aa:af:80 is the only MAC address for the troubled host, there is no way this machine could see traffic "bouncing back" -- the destination MAC address for the dupe packet is 00:20:78:e1:5a:80.
p 110: Another "troubleshooting" example fails to recognize that packets 1-18 and 29 are part of one unique TCP session, and 19-28 are an entirely different session. Packet 29's RST ACK is not an "acknowledgement" of the RST in packet 28; besides not being an actual protocol mechanism, those packets are from different sessions anyway!
p 112: "More ominously, most of the traffic is being sent with the TCP PSH flag on, which forces a receiving computer to skip its buffer and push that traffic straight through, ahead of any other traffic. That is almost always a bad sign." It's a bad sign when you don't know what you're talking about, apparently.
p 129: "Display filters make it easy to search for traffic such as DCEPRC (sic), NetBIOS, or ICMP, which should not be seen under normal circumstances." I guess Windows networks never use at least DCERPC regularly?
This book should not have been published. The author should sit down with Interconnections, 2nd Ed by Radia Perlman, Troubleshooting Campus Networks by Priscilla Oppenheimer/Joseph Bardwell, and The Internet and its Protocols by Adrian Farrel, and learn how networks operate. Then he should have Gerald Combs REALLY provide a technical edit of PPA, since it's clear Mr Combs probably skimmed this book without catching the issues noted above.
The only positives I can say for PPA is that, like other No Starch books, it's form factor and readability is excellent. The diagrams are clear (albeit often misunderstood) and the obvious typos are few. As far as learning anything, the mention of "Expert Infos" on p 100 was nice.

Click Here to see more reviews about: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems



Buy Now

Click here for more information about Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Read More...

Securing the Smart Grid: Next Generation Power Grid Security Review

Securing the Smart Grid: Next Generation Power Grid Security
Average Reviews:

(More customer reviews)
I've read plenty of infosec related books in the past, but none that do exactly what this one sets out to do - to take information security and apply it solely to a specific industry. The book starts by introducing the two fields - electric grids and information security. It then slowly brings the two disciplines together as it discusses the threats, vulnerabilities, and risks associated with smart grid technologies and devices. It is a very current book, discussing technologies that are currently available and in use and systems and largely ignoring the theoretical technologies which may or may not eventually exist. For example when discussing smart grid devices and social networking, something which I initially dismissed with a "pffft - who would ever do that?", they give actual live examples of locations and technologies (like the tweet-a-watt) that are distributing electricity usage information via social networking sites.
One of the things that surprised me the most about this book is that it's aimed simultaneously at the enterprise and the consumer. There are sections which talk about consumer electronics, and provide consumers safety tips, and there are sections which talk about enterprise web applications and other enterprise related systems.
The seasoned security professional will not learn a lot of new information about security here, but they will see it applied to a specific domain they may not have thought of before. The consumer interested in the security and privacy implications of smart grid technologies will get a great introduction to security. The employee of an electric company will also see an introduction to security that is highly relevant and meaningful to their industry. Overall while the focus is narrow, if it is appropriate to you, this is certainly a good book.

Click Here to see more reviews about: Securing the Smart Grid: Next Generation Power Grid Security


"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University.

"Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society."-- Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM

Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar.

Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small.

Details how old and new hacking techniques can be used against the grid and how to defend against them
Discusses current security initiatives and how they fall short of what is needed
Find out how hackers can use the new infrastructure against itself

Buy NowGet 35% OFF

Click here for more information about Securing the Smart Grid: Next Generation Power Grid Security

Read More...

The CISSP and CAP Prep Guide: Platinum Edition Review

The CISSP and CAP Prep Guide: Platinum Edition
Average Reviews:

(More customer reviews)
I have just passed my CISSP exam, taken on Aug 2008. This guide was my sole reference book that I used and I also DID NOT attend the review seminar for CISSP. Having said that, I would not recommend it as your only source of CISSP reading material as it slightly outdated by now, as compared to some of the questions that I have encountered on the exam.
The quizzes listed on the book are also way too easy and nowhere near the trickery shown on the actual exam questions. For giggles and laughter, I actually visited the bookshop to review the 'Official ISC2 Guide to CISSP CBK' a couple days after taking the exam, and found out that the quiz questions listed in the book are worded similarly to the exam. I did not read through the chapters for that guide, so I could not make a sound comparison between the 2 books.
However, I could safely say that you should not just rely on one book and read the usual suspects of 'The All-In-One..', 'The Official Guide to CISSP CBK' and this book in your CISSP exam preparations.
Good luck!

Click Here to see more reviews about: The CISSP and CAP Prep Guide: Platinum Edition

This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, especially in the areas of cyber-terrorism prevention and disaster recovery. You'll also cover CAP, a major section of the ISSEP that has been elevated from its status as part of an advanced concentration to its own certification. The accompanying CD-ROM contains revised test questions to make your preparation complete. Order your copy today and make your exam preparation complete!

Buy NowGet 45% OFF

Click here for more information about The CISSP and CAP Prep Guide: Platinum Edition

Read More...

Network Security for Dummies Review

Network Security for Dummies
Average Reviews:

(More customer reviews)
I bought this Network Security for Dummies after spending two frustrating hours in a large bookstore looking at one security text after another and finding that they were all written for people who already know a lot about networks. I suppose the assumption is that you won't get into network security until you have experience running a network, but the small company where I work only just set up a network and we need security right away. We can't afford to pay someone to run the network or be in charge of security. To my relief, the author of Network Security for Dummies understands this. It is obvious that she is just as knowledgeable about protecting networks as the authors of the other books I looked at (I was pretty amazed at what I found when I searched the web for the NRO, which the cover says is where she used to work). But she has taken the time to explain things to those of us who don't live and breathe computers. And she does so without talking down to you. At work we have already used some of the techniques she suggests and I feel confident we can make our network a lot more secure than it was, without spending a lot of money, but with the added advantage of really understanding what we are doing.

Click Here to see more reviews about: Network Security for Dummies

CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your favorite Web sites and stolen thousands of credit card numbers. The FBI just released a new report on computer crime that's got you shaking in your boots. The experts will tell you that keeping your network safe from the cyber-wolves howling after your assets is complicated, expensive, and best left to them. But the truth is, anybody with a working knowledge of networks and computers can do just about everything necessary to defend their network against most security threats.
Network Security For Dummies arms you with quick, easy, low-cost solutions to all your network security concerns. Whether your network consists of one computer with a high-speed Internet connection or hundreds of workstations distributed across dozens of locations, you'll find what you need to confidently:
Identify your network's security weaknesses
Install an intrusion detection system
Use simple, economical techniques to secure your data
Defend against viruses
Keep hackers at bay
Plug security holes in individual applications
Build a secure network from scratch

Leading national expert Chey Cobb fills you in on the basics of data security, and he explains more complex options you can use to keep your network safe as your grow your business. Among other things, you'll explore:
Developing risk assessments and security plans
Choosing controls without breaking the bank
Anti-virus software, firewalls, intrusion detection systems and access controls
Addressing Unix, Windows and Mac security issues
Patching holes in email, databases, Windows Media Player, NetMeeting, AOL Instant Messenger, and other individual applications
Securing a wireless network
E-Commerce security
Incident response and disaster recovery

Whether you run a storefront tax preparing business or you're the network administrator at a multinational accounting giant, your computer assets are your business. Let Network Security For Dummies provide you with proven strategies and techniques for keeping your precious assets safe.

Buy NowGet 7% OFF

Click here for more information about Network Security for Dummies

Read More...

CompTIA Security+ Deluxe Study Guide: SY0-201 Review

CompTIA Security+ Deluxe Study Guide: SY0-201
Average Reviews:

(More customer reviews)
I purchased this book 3 weeks before I sat for the exam. The book content, flash cards and 4 practice exams were just the right balance to pass the exam. I would recommend this book to anyone needing/wanting to get the Security+ certification.

Click Here to see more reviews about: CompTIA Security+ Deluxe Study Guide: SY0-201

CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test engine and electronic flashcards. Find authoritative coverage of key topics like general security concepts, communication security, infrastructure security, the basics of cryptography and operational and organizational security. The Deluxe edition contains a bonus exam, special Security Administrators' Troubleshooting Guide appendix, and 100 pages of additional hands-on exercises.

For Instructors: Teaching supplements are available for this title.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Buy NowGet 30% OFF

Click here for more information about CompTIA Security+ Deluxe Study Guide: SY0-201

Read More...

Beautiful Security: Leading Security Experts Explain How They Think Review

Beautiful Security: Leading Security Experts Explain How They Think
Average Reviews:

(More customer reviews)
This collection of essays is a very clearly written introduction to a number of current topics and techniques in computer security. It is not a how-to book, but it includes several case studies and gives you a good idea of what is happening in the field. For the most part the book does not assume prior knowledge in the field, although occasionally a bit of hacker or security jargon is used without being defined.
For me the most interesting chapters were the one with case studies. In this book you will learn how to steal people's credit card numbers at airports (run a cut-rate WiFi access point), how to scan for malicious websites without getting infected (harder than it looks, and a constant battle of measures and countermeasures), and the true history of Pretty Good Privacy, as told by its inventor, Phil Zimmermann (not as lurid as the versions you have probably heard, but still full of twists and turns). You'll learn the going rates for stolen personal and financial information (not that much, so if you're going to steal it, you need to steal a lot) and how to run your own cyber money-laundering network (which seems to be where most of the money and the risk is). Microsoft plays a prominent role in the book, sometimes as hero, sometimes as chump.
The layout and production of the book are very good, and it has a good index (a glossary would have been nice, too). I have a couple of minor gripes: the book is set in itty-bitty type (I measured it at 8 points on 12 point line spacing); and although the book has two editors, the preface is written in the first person singular (apparently by Oram, but this is not stated).
The book's title, "Beautiful Security", was probably modeled on Oram's previous collection Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice (O'Reilly)), but it doesn't really fit the content of this book. Some of the essays mention beauty in the body or the title, but this is usually a token appearance, or is explained as meaning that security should be built in rather than tacked on. The preface states that the purpose of the book is to convince the reader that security is not bureaucratic drudgery but is an exciting career, and I think the book is successful at this.

Click Here to see more reviews about: Beautiful Security: Leading Security Experts Explain How They Think



Buy NowGet 17% OFF

Click here for more information about Beautiful Security: Leading Security Experts Explain How They Think

Read More...

CompTIA Security+ 2008 In Depth Review

CompTIA Security+ 2008 In Depth
Average Reviews:

(More customer reviews)
I used this as a third resource for the exam, after the Sybex Security+ Study Guide and the Security+ All-In-One book Passed 855/900).
This volume is slightly more current than the other two and provides useful supplemental material. I do not believe that it can be used as the only resource to pass the exam, your mileage may vary.
Good visual layout, easy reading. Very brief review section at the end of each chapter. No supplemental CDROM.

Click Here to see more reviews about: CompTIA Security+ 2008 In Depth

"CompTIA Security+ 2008 In Depth" gives you the coverage you need to pass CompTIA's latest Security+ exam and to fully understand the current risks and threats to an organization's data. If you are just entering the IT field, you will appreciate the comprehensive coverage of the tools and techniques necessary to safeguard electronic data. You'll also learn everything you need to pass the Security+ exam and attain this increasingly valuable certification. All the domain objectives itemized by CompTIA in their Security+ exam are covered: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security.

Buy NowGet 37% OFF

Click here for more information about CompTIA Security+ 2008 In Depth

Read More...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security) Review

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Average Reviews:

(More customer reviews)
Wow! This is the most comprehensive book on information security out there! I keep it handy in my office at all times and have bought copies for all my employees, who refer to it on a near-daily basis. This really is a must-have for anyone in the industry to keep on top of the latest state-of-play for infosec. 5 stars!!

Click Here to see more reviews about: Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)


This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures.

In addition, this book also covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems.

From this book, the reader will also learn about applying the standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients.

Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures to prevent and mitigate threats to mission-critical processes. Techniques are explored for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.

A public key infrastructure (PKI) is an increasingly critical component for ensuring confidentiality, integrity and authentication in an enterprise. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications.

This book will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques, as well as allowing access to key services while maintaining systems security.

Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise.
This book's comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints.
Presents methods of analysis and problem-solving techniques, enhancing the readers grasp of the material and ability to implement practical solutions.


Buy NowGet 24% OFF

Click here for more information about Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

Read More...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 Review

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
Average Reviews:

(More customer reviews)
This book is great. Why? Well it's not just because its a great study guide for the CEH exam (Certified Ethical Hacker), but also for the amount of info crammed into a small book. If you're wanting to learn the basics of ethical hacking, then this is the book. Its a quick read, packed full of interesting workable senarios.
What this book is:
1. A great book for your junior security people.
2. Very easy to work through the chapters as labs.
3. Lots of references to cool programs you can find and download.
What this book isn't:
1. Your not going to learn any code.
2. If you're already a better than average hacker this book is not for you.
3. You won't get CEH certified with this book as a stand alone.
4. You do need a basic understanding of networking, security and systems. (This book isnt hacking for dummies).

Click Here to see more reviews about: CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50



Buy NowGet 37% OFF

Click here for more information about CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50

Read More...

Hacking: The Next Generation (Animal Guide) Review

Hacking: The Next Generation (Animal Guide)
Average Reviews:

(More customer reviews)
I'm always skeptical about books that propose to cover such a vast spectrum of subjects, the book in question however does a wonderful job at explaining in plain english what is happening behind an attack, it unveils the possible motives and end result, and I personally found it a superb manuscript on what is happening today in the fields of hacking and social engineering.
On a more technical side it covers XSS attacks and blended exploits, again in plain english. Though the authors also throw some code in there to keep the techiest of us entertained, personally I found the inclusion of code somewhat unnecessary. 'Plain english' would suffice especially because I found that this would otherwise be the perfect book to hand to someone less techy who wants to know what is happening out there in the wild and to some extent what they need to look out for if they intend to be security conscious. Could they ignore the code? sure! will they? depends on the individual and his/her aversion to programming. It still keeps its five stars though, I cant fault a book for having too much information. The book also covers phishing attacks, that chapter was a very worth wile read. I hold no interest or curiosity in phishing attacks and after reading it I was surprised on what I had learned.
The chapters on social engineering and information gathering were very interesting as well. The authors made a clear effort to mention current online tools that attackers can use to acquire information on a target (may that be a person or a corporate entity) and go into deeper detail on how such an attack can develop into face to face contact with a target. The way the book is written makes it feel like a story, like one attack unfolds into another and that is really why this book is such good fun to read.
If there's something I can fault in this book its really its life span. You have to get it now for it to matter. In 2 years time all this will be old, stale news and at the speed things change in the IT/IS world its really quite inevitable. Social engineering will always be social engineering but the tools used to gather information will surely change.

Click Here to see more reviews about: Hacking: The Next Generation (Animal Guide)



Buy NowGet 38% OFF

Click here for more information about Hacking: The Next Generation (Animal Guide)

Read More...

Network Security Bible Review

Network Security Bible
Average Reviews:

(More customer reviews)
This is a great book; it goes in great detail about security in all aspects of the computer industry. However it lacks one critical aspect, how do I do that? Like all network and computer professionals, I do not know everything, so when you tell me I should do something a certain way I'd hope that you will also tell me how to do it. With this book I found myself saying, maybe they will tell me what to do later, over and over, never happens. If you want to buy a book that's a reference manual, this is the one to get. If you are looking for a "how to" as well as a "what to look for" book, consider looking elsewhere.

Click Here to see more reviews about: Network Security Bible



Buy NowGet 39% OFF

Click here for more information about Network Security Bible

Read More...

CISSP: Certified Information Systems Security Professional Study Guide Review

CISSP: Certified Information Systems Security Professional Study Guide
Average Reviews:

(More customer reviews)
I must admit a soft spot for Sybex (and Ed Tittel) study guides, having used them extensively for Microsoft exams. This book follows in that tradition, providing a good balance between detailed explanation and comprehensive coverage of the exam topics.
The bundled CD is useful. I raced through the 250 flash cards in an hour, which is good for jogging the memory. The four bonus exams, of 75 questions each, are good, but are not as difficult as the real thing. These exams provide grades broken down by each CISSP exam domain, which is excellent for identifying topics for revision.
One book can not guarantee coverage of all CISSP exam topics, particularly given the long list of references on the CISSP suggested reading list. I also skimmed through a friend's copy of Shon Harris's "All-in-One" exam guide. I would still rate this book higher, but Harris's book covers some topics in more detail then the Sybex book. The "All-in-One" practice exams are more difficult, though some of the questions are not clearly worded.
The biggest disappoint I have with the exam preparation experience is with the CISSP's ten domains. The examination questions are based on 'good exam fodder' from topics in the ten domains. The topics lean towards an academic approach to security, rather then knowledge needed by a working security professional.
The other references I would strongly suggest to help to gain a security brain, as well as a high exam score include: Stephen Northcutt's `Inside Network Perimeter Security', Ross Anderson's `Security Engineering', and Syngress's `Special Ops'. Maybe I should take one of the SANS security exams, which are much more practical in nature.
And best of luck with the exam!

Click Here to see more reviews about: CISSP: Certified Information Systems Security Professional Study Guide



Buy NowGet 41% OFF

Click here for more information about CISSP: Certified Information Systems Security Professional Study Guide

Read More...

CISSP Guide to Security Essentials Review

CISSP Guide to Security Essentials
Average Reviews:

(More customer reviews)
Peter Gregory is a prolific author and well-known computer security professional who is also very active in the information security community. Peter wrote this book to address the current situation in information security, which is stated in the Introduction, as "There aren't enough good security professionals to go around". Information security is a broad field with many sub disciplines. Many professionals feel they should know more about security, but don't know where to start. Peter's book is an attempt to change that situation by providing the foundational materials that every security professional needs to know before undertaking advanced or specialized study. The book is suitable for self-study or as a classroom text. Each chapter has a summary, a glossary of key terms, review questions, hands-on projects, and ideas for case projects. For those interested in obtaining the CISSP, they will find this book a good place to start. The strength of this book lies in its organization and clarity. The book's ten chapters map to the ten CISSP Common Body of Knowledge Domains. Each chapter is broken into many subheadings, with an outline-style organization that clarifies each distinct topic. Acronyms are defined in the text and in the glossaries, which are presented in each chapter and at the end of the book. There are two appendices. One appendix provides summary outlines of the ten domains of CISSP security; the other reproduces the code of ethics of CISSP professionals. The Introduction reviews the steps needed to obtain CISSP certification and, together with the code of ethics, gives a good sense of the knowledge, behavior, and attitude necessary to succeed as a security professional. A CD-ROM containing practice questions for the CISSP exam is included. No single book can provide all you need to know to be a CISSP, but this is a good place to start.

Click Here to see more reviews about: CISSP Guide to Security Essentials

CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials provides readers with the tools and resources they need to develop a thorough understanding of the entire CISSP Certification Body of Knowledge. Using a variety of pedagogical features including study questions, case projects, and exercises, this book clearly and pointedly explains security basics. Coverage begins with an overview of information and business security today, security laws, and then progresses through the ten CISSP domains, including topics such as access control, cryptography and security architecture and design. With the demand for security professionals at an all-time high, whether you are a security professional in need of a reference, an IT professional with your sights on the CISSP certification, on a course instructor, CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials has arrived just in time.

Buy NowGet 47% OFF

Click here for more information about CISSP Guide to Security Essentials

Read More...

Digital Video Surveillance and Security Review

Digital Video Surveillance and Security
Average Reviews:

(More customer reviews)
I suspect that this is going to be a text book in some course. It is far beyond the scope of the average handy guy who just wants to put in his own security system. It is designed for huge office buildings and equipment that is too sophisticated and expensive for the layman.
In other words, don't get this if you are thinking of putting in your own computer camera surveillance for your home and property.
If you are in the business of installing for corporations, then it may be what you are looking for.

Click Here to see more reviews about: Digital Video Surveillance and Security


Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position, areas of coverage, hardware and software to select in order to maximize the effectiveness of newer lower cost networked technologies. Clear, step-by-step descriptions and detailed illustrations describe the integration of such components as the current or new security system, door and window sensors, or other access controls, instantly launching a video of the area under the surveillance on a computer or HDTV.
*Vendor-neutral comparisons of camera equipment and recording options*Case studies and descriptions of best practices*Step-by-step guide to planning and installation*Easy-to-read diagrams and schematics

Buy NowGet 28% OFF

Click here for more information about Digital Video Surveillance and Security

Read More...

CompTIA Security+Study Guide: Exam SY0-201 Review

CompTIA Security+Study Guide: Exam SY0-201
Average Reviews:

(More customer reviews)
The book is built on a clean language, the ideas are well organized inside each chapter, but you could perceive that chapters themselves are not in the optimal order...Sometimes you have to jump from one chapter to another to cover completely an idea exposed in this book.
On the other hand, you will have to buy additional simulations and practice questions to complete your preparation, because this book does not offer you practice questions with the appropiate level of complexity compared to the real exam.

Click Here to see more reviews about: CompTIA Security+Study Guide: Exam SY0-201

Comprehensive Coverage to Help You Prepare for the SY0-201 Exam and Beyond

This CompTIA Authorized Study Guide provides complete coverage of the objectives for CompTIA's Security+ Exam (SY0-201), with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test engine and electronic flashcards. Find authoritative coverage of key exam topics like general security concepts, communication security, infrastructure security, the basics of cryptography and operational and organizational security.

Coverage includes:

General Security Concepts
Identifying Potential Risks
Infrastructure and Connectivity
Monitoring Activity and Intrusion Detection
Implementing and Maintaining a Secure Network
Securing the Network and Environment
Cryptography Basics, Methods, and Standards
Security Policies and Procedures
Security Administration

FEATURED ON THE CD:

Sybex Test Engine including an assessment test and practice exam
Chapter Review Questions
Electronic Flashcards
Entire book in a searchable PDF

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

For Instructors: Teaching supplements are available for this title.


Buy NowGet 41% OFF

Click here for more information about CompTIA Security+Study Guide: Exam SY0-201

Read More...