Global Shopping Center
UK | Germany
Home - Books - Computers & Internet - Authors, A-Z - Anonymous Help

1-3 of 3       1

click price to see details     click image to enlarge     click link to go to the store

$32.99 $6.18 list($49.99)
1. Maximum Apache Security
$16.04 list($49.99)
2. Maximum Security, Fourth Edition
$33.99 $0.77 list($49.99)
3. Maximum Windows 2000 Security

1. Maximum Apache Security
by Anonymous
list price: $49.99
our price: $32.99
(price subject to change: see help)
Asin: 067232380X
Catlog: Book (2002-06-15)
Publisher: Sams
Sales Rank: 405419
US | Canada | United Kingdom | Germany | France | Japan

Book Description

Many of the high-profile attacks on prominent Web sites of the last couple years are a direct result of poor Web site or Web application security.

With more than 65 percent of Web sites using the Apache Web server and the Apache-based open source Web development environment and with the risk of sabotage greater than ever Apache administrators and developers need to know how to build and maintain secure Web servers and Web applications.

Yet most of the currently available Apache books lack detailed information on important Web administration topics like security.Maximum Apache Security details the complex security weaknesses and risks of Apache, and provides hands-on solutions for keeping a Web site secure and buttressed against intruders.It includes up-to-date coverage of both Apache 2.0 as well as Apache 1.3.

... Read more

2. Maximum Security, Fourth Edition
by Anonymous
list price: $49.99
(price subject to change: see help)
Asin: 0672324598
Catlog: Book (2002-12-16)
Publisher: Sams
Sales Rank: 306480
Average Customer Review: 4.01 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Book Description

Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

... Read more

Reviews (96)

3-0 out of 5 stars A Third Edition that's lost its edge
I am a senior engineer for network security operations who hoped Maximum Security, Third Edition (MS:3E) would revive the spirit of the first edition, published in 1997. Some protested its publication, while others welcomed its endorsement of the full disclosure movement. Sadly, the third edition has become, in the author's words on page 22, "another general Internet security book." Few will find it revolutionary.

MS:3E features 14 authors, each commendably given credit for their chapters. Of these, Craig Balding's chapter on UNIX reigns supreme. For a book labeled "intermediate-advanced," only Craig's chapter delivers at that level. I liked his file system risk and kernel rootkit material, and his service-by-service security discussion was great. In contrast, the chapter on Microsoft's operating systems is mainly a laundry list of outdated exploits. I also found the virus, Cisco, and security policy chapters useful. (Note: chapter 7, page 121 -- TCP sequence numbers count BYTES of data, never packets! This is a common misunderstanding.)

Readers seeking no-nonsense product evaluations should look elsewhere. Bland lists of IDS and firewall packages will neither offend vendors nor offer practical guidance to buyers. I prefer authors who take a stand, like Paul Proctor or Stephen Northcutt -- even if I disagree with them!

MS:3E will not shock the security world as the first edition did. Too many other security web sites and books have shared "hacking secrets" with the masses. This condition endorses the Anonymous author's first edition goal, but makes his third edition redundant. If he plans to write "general security books," I suggest he continue his theme of OS-specific titles. (Maximum Linux Security, Second Edition arrives soon, followed by Maximum Windows 2000 Security, First Edition.) Retire Maximum Security, or write a better general guide after transplanting the OS-specific material to their respective titles. Better yet, write a book on how to develop, code, and employ new exploits; that will be ground-breaking work! (Disclaimer: I received my review copy free from the publisher.)

4-0 out of 5 stars The Book is Good, Despite Its Faults

Whatever. I think the book is good. (No doubt, there are some errors. Utilities often get grouped into the wrong categories and such, but overall, the book is very good).

I bought it just for the bibiographical section at the back, which is almost 40 pages. There's also several hundred (maybe a thousand, I am not so sure) tools described. The book also shows the locations of these and that's very useful. It would take weeks to track down all that stuff.

But, the reviewer from Maryland is mistaken. He's talking about 14 year olds like they're idiots and can barely spell UNIX. He needs to get a clue. In the book, the anonymous author meticulously discusses these "idiot" 14 year olds. They are the same _idiots_ that penetrated DoD computers this past month. (In fact, those kids probably bought a copy of Maximum Security. Maybe the FBI should check their bookshelf. :-) And these "14 year old idiots" consistently penetrate supposedly secure computer systems all over the world. Phreakers and Hackers have historically always been young people. So, I have this to say: if the only people buying Maximum Securityare 14 year olds, then we have a problem. Becausde, the rule used to be that a kid had to search high and low through 2600, Phrack nd a million other on-line zines to learn someting. Maximum Security has totally dipensed with that process. The book is an instant hack manual. There is no better intro to hacking, period. I think detractors are just jealous they didn't write the book.

4-0 out of 5 stars Packed with quality links to specific information
There is no task more daunting than one that is fundamentally impossible, extensive and yet necessary. Computer security is like that, as the only secure computer is one that is disconnected from all power sources. The moment it is powered up in a mode that allows useful work to be done, it becomes vulnerable. Furthermore, the number of ways it is vulnerable is effectively infinite, meaning that the number is so large and complex, that it is not possible to handle them all. Finally, it is necessary, as the world is full of a large number of people whose sole purpose in life seems to be to cause as much damage and frustration as they possibly can. Therefore, there is no choice but to apply as many security features as possible to all our computer systems.
This book is an overview of the primary aspects of computer security. Split up into the six broad categories: security concepts, hacking 101, a defender's toolkit, weapons of mass destruction, architecture, platforms and security; and security and integrated services, there is also an extensive bibliography of websites, books and software. If you are interested in an overview of computer security, then this book will provide it.
However, the main value that I get from the book is from the links to more detailed information. I recently taught a special topics course in computer security and I found it invaluable in tracking down detailed information concerning topics such as specific types of distributed denial of service attacks, steganography, password cracking dictionaries and communication protocols. The encyclopedia form of the book makes it very valuable as a primary initial reference.
Useful as an overview for people seeking their first knowledge of computer security, this book will also have value for the IT worker who needs pointers to specific information regarding computer security.

5-0 out of 5 stars A practitioner's point of view...
Well, I have bought every version of this book since the first and continue to find reasons enclosed to keep it on my bookshelf. I even own Maximum Linux Security. Yep. It's excellent as well.

Not only does the book give you a good feel about where to find the tools of the trade it also gives you insight into their usage.

I regularly investigate computer-based instrusions and find that many of the concepts included in these chapters are enclosed.

I cut my teeth on this series of books a few years ago and continue to keep my skills fresh with them today.

I belieive in this book. I think any serious practitioner should at least browse it to see what he or she is missing. Loved it - Keep them coming.

I'm looking forward to seeing if this edition has anything on the latest exploits concerning the use of Nimda/Code Red/Unicode invasions that I am seeing in conjunction with Scanner Tools and remote control utilities is discussed or not... IRC-Scripters...

Anyone have info contact me ...Thanks...

4-0 out of 5 stars Essential information and a lot of it
Security is an enormous task, the amount of information in this book, both written and referenced, is intimidating. Furthermore, the reality that it is necessary for your survival can raise your blood pressure and the number of hours you lay awake at night. Fortunately, it is not necessary to do it all at once and there are software tools that can make the scanning for security problems much easier.
This book contains complete descriptions of the most common forms of computer security problems, including how attackers use the weaknesses and links to additional information. Computer security is an area of computing that is very close to the shadowy world of spies and secret agents. Fourteen contributors other than the lead author are listed on the inside front cover, four of which are not pictured. The lead author is also listed as anonymous.
In terms of content, the descriptions are complete, both in coverage and detail. Somewhere, somehow, the people who manage the IT facilities at organizations must make contact with the material in this book and it is as good a place as any to do so. The authors also do an excellent job in aggregating references to more detailed explanations of the various areas of security. You could literally spend weeks following all the research paths listed for most of the topics.
The only people who can afford to do nothing are those who have nothing. Everyone else should read this book and take the appropriate actions to protect themselves. ... Read more

3. Maximum Windows 2000 Security
by Anonymous, Mark Burnett, L. J. Locher, Chris Doyle, Chris Amaris, Rand Morimoto
list price: $49.99
our price: $33.99
(price subject to change: see help)
Asin: 0672319659
Catlog: Book (2001-12-15)
Publisher: Sams
Sales Rank: 748040
Average Customer Review: 3 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Book Description

Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional Protocols,
  • Web Server Security,
  • Denial of Service Attacks,
  • Intrusion Detection,
  • Hacking Secure Code in Windows 2000.
  • ... Read more

    Reviews (2)

    3-0 out of 5 stars Due to lack of originality, this book fails to satisfy
    I am a senior engineer for network security operations. I read "Maximum Windows 2000 Security" (MW2S) to learn more about Windows 2000 vulnerabilities. While the philosophy espoused in MW2S is appropriate, the book fails to deliver any original content. If you've read "Windows 2000 Security Handbook" by Cox/Sheldon, and "Hacking Exposed: Windows 2000" by Scambray/McClure, you don't need to read MW2S.

    I do not feel my time reading this book was well-spent, as I'd encountered almost every topic elsewhere. The advice on how to exploit Windows 2000 web servers (ch. 13) was weaker than I'd expected. The suggested tools list in ch. 3 was incredibly sparse. I am more involved with defending Windows systems than attacking them, but I was still able to easily collect a more comprehensive Windows attack tool kit than that listed in ch. 3.

    MW2S is frequently internally redundant, with multiple chapters rehashing the same advice, most of which is already published. The book also mentions a nonexistent CD-ROM and suggests readers to refer to the publisher's web site for certain links. I couldn't find anything beyond the normal book catalog entry for MW2S on that web site. I believe the book may have been rushed to publication, with loose ends left hanging.

    The original "Maximum Security" was interesting because it concentrated on exploiting vulnerabilities. Five years later, its descendants are more likely to be generic security books than ground-breaking texts. I'm hoping "Maximum Network Security" (due this month) breaks this trend.

    (Disclaimer: I received a free review copy from the publisher.)

    3-0 out of 5 stars Corrections
    First, the book is not 900 pages, it is 624.
    Second, there is NO CD.
    Information provided is consistant in quality of the other Maximum Security series (later editions). ... Read more

    1-3 of 3       1
    Prices listed on this site are subject to change without notice.
    Questions on ordering or shipping? click here for help.