Book Reviews

Best Defense

What's going on in your network? Who can you trust? Take a look at Hackproofing Your Network and find out just how vulnerable you may be.

In today's high-tech Internet-enabled world, it's generally accepted that the question isn't if you've been attacked, but when and how often. This book serves to educate security professionals in the techniques commonly used to penetrate systems and networks. Topics include low-level physical compromises, such as simple network sniffs; high-level compromises that require a firm understanding of computers; the way the operating systems work on those compromises; and how unexpected inputs can lead to potential vulnerabilities.

The book is organized into highly specialized chapters that can be treated as separate unique methods of system compromise. In general, the author for each section explains the general purpose of a vulnerability, methods of utilizing this vulnerability and techniques used to stop or mitigate related attacks.

The title can be quite misleading when compared to the content of the book. While readers might expect to find this book focused on methods of prevention, the majority of the time was spent explaining how to find and utilize vulnerabilities in order to penetrate a network. This doesn't suggest that the book doesn't address methods of prevention, just that it doesn't dedicate quite as much time to the subject. It would be prudent to caution potential buyers about buying this book by the title alone. Instead, buyers should take the time at the bookstore to read the first chapter, which gives an introduction to the material and lays the groundwork for what to expect.

As each chapter is written by a different author or a different group of authors, it's not surprising that style and technical detail vary. Each section provides enough explanation to convey the knowledge necessary to understand the exploit being described. Some chapters, however, went into highly detailed examples to explain exactly how vulnerabilities are exploited. My biggest concern with this book is the lack of right-brain stimulation. Without a fair amount of sideline quips, situational jokes and amusing banter, I found it difficult to stay focused over a long period of time. The sideline stories, however, did ease the situation by adding real-world perspectives to the mostly theoretical discussions presented in each chapter.

Because information security is an ever-evolving science, it should be no surprise that the publisher provides a companion Web site to the book. By providing a venue to post white papers, make code that was used throughout the book downloadable, and distribute an electronic version of the book, the problem of becoming outdated by the time the book prints is mitigated. Although only one white paper was available at the time of this review, this is most likely due to the recent the publish date. I submitted five questions to the author. Three of these questions received a response in exactly one week. The other two remain unanswered after two weeks. The responses that were received were very satisfactory in answering the question presented, and two of these questions made it to the Web site's "Ask the Author" question and answer page.

Overall, this book is a good addition to any security professional's library. Technical professionals will find this book a valuable introduction to the world of information security and hacking techniques and they'll benefit most if they're already highly skilled as a computer professional (I suggest the targeted audience be someone with equivalent to MCSE skills or higher.)

About the Author

T. Brian Granier, CCNA, MCSE, MCP+I, A+, has been working in the computer industry since 1995. After receiving a degree in computer engineering technology from the University of Houston in 1999, Brian worked with Zebec Data Systems Inc. where he currently serves as the information security architect. His current projects involve major infrastructure revisions and technical security improvements in accordance with federal HIPAA regulations.

comments powered by Disqus
Most   Popular