Synopses & Reviews
Security continues to be the predominant concern for any company or organization that is either on the Internet now or considering it. Hardly a week passes where there isn't some new report of crackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or stealing user passwords and sometimes even credit card numbers.
When the first edition of this book was published in June 1997, its popularity caught everybody by surprise. It immediately shot to the top of several computer security bestseller lists, surpassing even established security books from O'Reilly, Wiley, and Addison-Wesley.
While undoubtedly some bought the book to learn how to hack, it turns out that the book's most enthusiastic fans were computer security managers who appreciated the book's comprehensive coverage and clear, to-the-point descriptions of the most common techniques hackers use to penetrate systems.
The hacking community, however, hasn't stood still. And a thoroughly updated and revised edition of this book is now required to discuss the hundreds of new computer system holes that have been discovered over the course of the past year, and to cover the latest techniques that hackers are now using to crack into computers and networks.