05.02.2013 Views

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

download issue 24 here - Help Net Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

And most of the time, they fail because they<br />

have come up against people who have<br />

knowledge about which attack vectors are<br />

likely to be deployed against a network and<br />

then securing it against them.<br />

This book covers a lot of ground. It starts with<br />

enlightening us about the myriad of ways an<br />

attacker can gather information needed to<br />

execute the attack: dumpster giving, social<br />

engineering, scouring the social networks for<br />

information, etc.<br />

Everyone should be made aware that the old<br />

division between trusted and untrusted zones<br />

and individuals can no longer be applied, that<br />

network protocols offer many dangers because<br />

they are were not built with security in<br />

mind and that every application has at least<br />

one vulnerability that can be exploited. It is not<br />

necessary for everyone to know how to fix<br />

these problems, but in this case, a little paranoia<br />

goes a long way.<br />

T<strong>here</strong> are all these helpful and wonderful tools<br />

and technologies out t<strong>here</strong>, and we use them<br />

every day to work and play and run errands.<br />

This book gives us an insight into all the bad<br />

things that can happen - so that we can make<br />

sure they don't.<br />

Final thoughts<br />

Zeljka Zorz is a News Editor for <strong>Help</strong> <strong>Net</strong> <strong>Security</strong> and (IN)SECURE Magazine.<br />

Hacking: The Next Generation is an extremely<br />

thorough, enjoyable and easy read. The<br />

authors aimed the book at anyone interested<br />

in learning the techniques that attackers use<br />

presently. I would say that it should be read by<br />

everybody whose work depends on computers<br />

- well, at least some of the chapters.<br />

It says everything it should without the endless<br />

repeating and rephrasing so that readers<br />

would understand the concept, because it was<br />

so clearly explained the first time. This is a<br />

book that will get and keep your attention, and<br />

a must-read book for everyone dealing with<br />

computer and information security.<br />

www.insecuremag.com 66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!