Halting the Hacker: A Practical Guide to Computer Security

Product Description
Halting the Hacker provides a unique look inside the mind of the hacker–you’ll understand how and why he makes the choices he does to attack your system. At the same time, you’re getting practical, step-by-step information on how to foil him! Unlike many other security books, this book shows you why you need to take particular steps, rather than just listing what to do. This gives you knowledge you can apply to future, as-yet-unknown, attacks. Organized around how … More >>

Halting the Hacker: A Practical Guide to Computer Security

5 replies
  1. Anonymous says:

    Being a hacker, i picked up this book to learn new ways of entering a system. What I found was 200 pages of garbage. The methods described in this book are old, unused, and juvenile. No real hacker uses these methods anymore.
    Rating: 2 / 5

  2. Anonymous says:

    This new expanded edition of Halting the Hacker came out in 2002 and is nearly double the size of the original edition. It takes the insight of how hackers attack systems from Pipkin’s first edition and delves into the details of how to protect your Unix and Linux systems.

    Real-life stories about hackers and companies who were hacked are sprinkled throughout the book making it an easy read for anyone, not just techies. The tools discussed (and which come with it on the included CD-ROM) makes it a valuable resource for everyone who deals with Unix/Linux systems.

    Highly recommended!
    Rating: 5 / 5

  3. Ben Rothke says:

    It is ironic that the advent of the computer promised to dramatically reduce paper usage; today’s 1,000-page-plus computer-security tomes have probably single-handedly deforested whole regions of the earth. A happy exception to this trend of titanic texts is Halting the Hacker. Which is relatively concise yet highly informative.

    It provides a good overview of core information security issues and concepts. It takes a big-picture approach to information systems security, not bogging down the reader in arcane minutiae.

    Halting the Hacker delves into more intricate details and includes a CD-ROM with many security tools.

    Overall, it is valuable for anyone needing to know about information systems security without sacrificing a forest in the process.
    Rating: 4 / 5

  4. Anonymous says:

    Noticing the so called “hackers” word of disgust towards this book, I am left asking myself time and time again, was this book geared towards teaching the average joe to hack? Judging by it’s content and brief description I thought not, instead it offers a somewhat quick, realistic view of how companies all across the net are being attacked, and in doing so it offers a somewhat indepth but easy to understand method of securing ones computer.
    Rating: 2 / 5

  5. R. Enos says:

    This review is a collaborative writing project completed by the students in a “Technology and Ethics” class at DeVry University in beautiful Colorado Springs, Colorado. It is based on a quick look at the book under consideration.

    This book has several virtues. It provides a simple step-by-step process to keep hackers out. It also provides supportive links where you can download software to protect your hardware as well as business information. The simple wording allows you to concentrate on your work while helping you protect what you are working on.

    Although this book is outdated, it would still be helpful in setting up a security policy. The illustrations in this book would not be suitable for some business environments; however they would be useful for the individual computer user.

    I would recommend this book to beginners in the computer technology field. This book comes with a useful CD-ROM that contains software and added resources.
    Rating: 4 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.