Jump to ratings and reviews
Rate this book

Hacking: The Next Generation [Paperback] DHANJANI

Rate this book
BOOKS

Paperback

First published January 1, 2009

19 people are currently reading
266 people want to read

About the author

Nitesh Dhanjani

9 books8 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
30 (29%)
4 stars
30 (29%)
3 stars
26 (25%)
2 stars
13 (12%)
1 star
2 (1%)
Displaying 1 - 5 of 5 reviews
Profile Image for Brian Powell.
205 reviews38 followers
November 20, 2016
This is not a book on how to hack, nor is it a book about pirates. It is not a tired rehashing of some step-by-step guide on how to break into systems, or a lightning tour of hacking tools of the trade. The reader is presumed to know these basic ideas, and is instead treated to a collection of case studies and examples of some of the more novel and interesting types of cyber attacks seen today.

The writing style is abysmal, as in "extremely bad or appalling" (not as in "very deep"). But, that tends to be a frequent criticism of hacking and computer security books in general, because generally hackers and security professionals aren't exactly scholars, or even usually very bright. The book could also have been made about half as long had the unnecessary screen shots of totally mundane log in screens been avoided.

The sections on web attacks and blended threats had depth and provoked some thought. Sometimes the authors treat you to some snippet of code that does one thing or another and that's helpful, but this is not a book about how to write shell scripts or exploits. It is also not a comprehensive survey of cybersecurity issues (nor is it meant to be), nor does it teach you how to command the high seas, board and seize a ship, or walk with a pegleg -- this text is a place to get a couple of ideas selected from a small patch of the cyber attack surface.
12 reviews
June 11, 2011
Required reading for everybody who uses a computer connected to a network.
Frightening examples of the way attackers combine features/minor bugs in different applications to work up the privilege chain to own a network.
Profile Image for Emiliyan Kirilov.
1 review1 follower
October 25, 2012
This is actually one of the first books on the subject that focus on explaining in great and user-friendly details about the current problems and security issues. This is what books on that matter need to look like! Great book, recommended it to a lot of IT-friends and they loved it as well!
Profile Image for Dgg32.
146 reviews6 followers
June 4, 2012
Learn some attack vectors. The book is less about coding than showing various hacking venues. So coders, be warned!
Displaying 1 - 5 of 5 reviews

Can't find what you're looking for?

Get help and learn more about the design.