Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
A**G
Great book, every IT Sec professional should read!
Great book in learning the fundamentals of IT Security and IT in general, and also goes into technical detail. Ed Skoudis is a really good author and able to convey IT Security in a fun to read format. A lot of people learning IT security now jump straight to the security tools and running scans, however it is important to know the fundamentals and the history behind computing and computer security, and this book gives a great background into the whole computing history and how security has or has not been built in. I enjoyed Ed’s writing style a lot, and while this book is dated, it still applies to the state of IT security today, standing the test of time. I recommend that everyone who is in IT security, read this book to gain a solid understand of IT and IT security principles, how attacks work, and how to defend yourself. I feel that this will help me in my career as an IT security consultant to better explain security principles to clients. It will also help you understand the fundamentals behind security concepts, which in this field, you will get challenged occasionally or frequently, and Counter Hack Reloaded will provide you with the base and understanding in order to defend your arguments against the inevitable combative types you will face in IT and IT security.
B**N
Excellent book for a broad overview of Computer/Network Security
Counter Hack Reloaded (CHR) is an excellent book for someone looking for a broad overview of computer/network security written in a very clear, logical, and even enjoyable manner.After CHR's Introductory chapter, the reader is given an overview on Networking, Linux/Unix, and Windows. These three chapters give the reader enough to be able to understand the subsequent chapters which deal with specific phases of an attack. These phases are, Reconnaissance, Scanning, Gaining Access (with different chapters for different methods of gaining access,) Maintaining Access, and Covering Tracks. Throughout these chapters, CHR introduces the reader to the tools used by attackers; how they work, where to get them, and how to defend yourself against them (often by using the tools themselves.) Finally, CHR "puts it all together" with different scenarios of attacks. The scenarios show how attackers use different phases of an attack, and different tools, to penetrate a network/system. Throughout this chapter CHR highlights the mistakes the victims make in their networks/systems to allow the attacks to succeed.CHR is exceptionally well written, especially for a technical subject. Explanations of complex topics are clear, simple and even entertaining. I would even go so far to say that it is a joy to read.Overall, CHR is about core concepts. It's about understanding how attacks occur, and understanding why they can succeed. Only then can you have any hope in understanding how to go about defending yourself.
S**D
Meh
Not bad for a high level book. But if you want a good intro to practical security this isn't the place. I recommend learning system administration and understanding secure programming.
J**N
Still amazingly accurate in 2012
There's really nothing to say about the quality that hasn't been said already in other reviews. This is an excellent, well-written, informative, and entertaining read! I am amazed at how accurate this book still is, despite being several years old. There are a few things that have changed since this book was released such as the Nessus vulnerability scanner licenses, and the availability of some tools. Also the section on wireless attacks could use a little updating to include newer strategies and tools, and there is no mention (that I can recall anyway) of either Cross Site Scripting (XSS) or Search Engine Optimization (SEO) Poisoning, as those are relatively new. Overall though this is an excellent place to start and a fascinating read. Highly recommended for everyone, not just aspiring security professionals. This book will open your eyes and drastically improve your personal security practices while entertaining you at the same time. Highly recommended!
F**L
Worked back then, probably outdated now.
Bought while im college YEARS ago. Outdated by now, but it helped me get that grade and past those security walls!!! AHAHAHAHAHAHAHAHAHA!!!!!!
B**Z
awesome
I'm technically not finished reading this book yet and probably never will be until they update it again and still it will be a good reference manual for several years anyway. Skoudis and Liston do have a way of making complex issues seem to make sense. I thank them for writing it and thank Amazon for making it available to me.
S**R
Five Stars
Good book for beginners, easy to read! (Even for international student such as me) With this book's help, I get a general understanding of computer system & network security, and my grade of Computer System Security raised from 69 (midterm) to 84(final exam). I must say, if you know nothing or a little about computer security, this is a must-buy book.
A**N
Time to Reload!!!
Counter Hack? Yeah that's a cool name, I guess. But how can I make this book sound more intense? I know! COUNTER HACK RELOADED!!!! AHH!!In all seriousness this book is full of info. I used it for my System Security class and we followed steps and lessons from this book. I would recommend it.
M**A
Incredible knowledge!
It is amazing, great and extraordinary!What you'll learn from this book is far beyond any expectations.The only thing I could say is that I really want an updated version with 2013 goodies. That would be bestseller!Don't get me wrong: even though it's not from 2012-2013, it still has so much useful information. It's a must buy for anyone wanting to know and understand how IT Security works.
M**.
No indexing and not very easy to navigate around
I am not at all impressed with the kindle edition of this book. No indexing and not very easy to navigate around. If I was aware of this I would have ordered a hard copy.
A**R
Excellent teaching / training material. highly recommended. A++++++
Highly recommended as it is presented in a manner to make difficult concepts easy to understand. Through and complete covering all the basic fundamentals of cybersecurity and network defensive configurations for all network infrastructure. Still relevant even though a bit dated material.
A**G
Counter hack reloaded
It's taken me a while to work through this book, but it's turning outto be well worth the purchase price. I've been in high tech for 32 yearsand in networking for half of that and this book is teaching me lots of newthings.
F**Z
The Best!
The best book to understand basics of information security, I bought the kindle version
Trustpilot
1 month ago
1 week ago