Book Review: HackNotes Network Security Portable Reference

    Date25 Jun 2004
    Posted ByAnthony Pell
    To keep it short and simple - "HackNotes Network Security" gives what is expected of it: loads of different information presented in an easily browsable format. The book is perfectly suited for two different types of readers: those who are working within the Information Security field and need to catch up with some of the most common security issues and procedures, and for those who need to show their upper management the magnitude of possible security risks in a network environment. . . . Introduction

    The HackNotes series quickly became one of the best selling titles in the computer security publishing sector. With some great marketing, mostly derived from the famous Hacking Exposed titles, it wasn't a tough job for Foundstone staffers to create this series of successful portable reference publications. Today I'm taking a look at one of the HackNotes titles that is concentrated on Network Security.

    Inside the book

    The HackNotes series is comprised of handy little books spread over about 200 pages covering quite a large amount of content specific topics. The authors' purpose is to provide just the relevant information on a different set of sub-topics. If you are a regular visitor to security web sites and forums, you'll most probably find this book a great repository of security vulnerabilities, tools of the trade, as well as both hacking and securing methods.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"5","type":"x","order":"1","pct":100,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.