Security Warrior
Publisher: O'Reilly Media
Final Release Date: January 2004
Pages: 556

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Table of Contents
Product Details
About the Author
Colophon
Recommended for You
Customer Reviews

REVIEW SNAPSHOT®

by PowerReviews
oreillySecurity Warrior
 
4.4

(based on 5 reviews)

Ratings Distribution

  • 5 Stars

     

    (2)

  • 4 Stars

     

    (3)

  • 3 Stars

     

    (0)

  • 2 Stars

     

    (0)

  • 1 Stars

     

    (0)

Reviewed by 5 customers

Sort by

Displaying reviews 1-5

Back to top

 
5.0

Very good book for pros and students

By jdruin

from Undisclosed

Comments about oreilly Security Warrior:

This book is similar in material to "Hacking: The Art of Exploitation" in that it covers exploitation hacks (reverse engineering, overflows, etc), networking hacks, authentication hacks, and ways to defend. The amount of information in one book is very good. This book covers a wide range of topic but also goes into depth on each area. For example, both wired and wireless topics are explored, client and server, web protocol, sql injection, IDS, forensics, and assembly language based hacks. This is a great book for students and security professionals. The knowledge itself is valuable plus the book is a good value due to its completeness.

 
4.0

Good introductory security book

By Jason

from Undisclosed

Comments about oreilly Security Warrior:

This is one of my favorite security books from O'Reilly, primarily for the first four chapters which are dedicated to reverse engineering software. While there are a few texts out there that are dedicated to the subject and go into almost painful detail, this book is great for someone who is new to the skill. The other chapter that I was happy to see was chapter twenty-two which covers forensics and anti-forensics. While the coverage on anti-forensics was a bit light, it was great to actually see it included. I would e very interested to see (perhaps write?) a full book on this from O'Reilly sometime in the future, particularly given some of the attack methods on full disk encryption coming out of Princeton as of late.

Overall, a great tome on security with a good body of solid and applicable information. I'm hoping to see an updated edition.

 
4.0

NLUG: Book Review - Security Warrior by Cyrus Peikari & Anton Chuvakin

By James Ko, CISSP

from Undisclosed

Comments about oreilly Security Warrior:

I enjoyed reading the Assembler and the reverse engineering section of the book. I didn't realize there are so many variants of x86 Assemblers. I thought it was brilliant to use the CD organizer as an analogy to program stack to explain the buffer overflow problem, The little HackMe challenge dramatizes the whole buffer overflow issue. It really sticks into reader's mind about how vulnerable our software industry stands today. However, I feel it fall short on the networking section, where the authors could have spent more time on explaining these evil hacking tools. There were no examples on how to use hping, for example. As far as I know, there are lot more evil packet injection tools out there worth mentioning, such as Nemesis, libnet, hping and packit. I was somewhat disappointed given that the authors said in the beginning (preface)this is an advanced security book that I would expect more on the networking side. However, on the positive note, the Log Analysis section is very valuable to system administrators because it provides a lot of good information. There is not a lot of literature out there spend time on explaining what log is, or what is being captured. In fact, log analysis is gaining popularity because it is used for security forensics where security professional tries to piece the evidence together. All in all, this is a very useful book for those who wants to have a survey of what is involved in the field of security incident handlers and/or intrusion detection.

 
4.0

Covers the spectrum well. Good reference.

By Alex Belt from the Columbia Java Users Group

from Undisclosed

Comments about oreilly Security Warrior:

This excellent, well-written book can be an enigma at times. The authors indicate that the material is for someone who has read on the subject before, although there is quite a bit of material geared more towards novices like myself. In other places I was defintely out of my depth, not having enough of a C/*Nix background to fully comprehend the material. The authors cover reverse engineering, network attacks, platform attacks, and defense/intrusion detection methods.

I very much liked the samples and references to existing tools, although they clearly indicate the possible criminal repercussions of using some of these tools/techniques. The samples provide invaluable insight and experience into learning the techniques, and how to thwart them, if it's possible at this time. The intrusion detection/defense material is split between information that would benefit everyone, including home pc users, and techniques more suited to professionals, such as advanced intrusion detection and network defense. This would be a very good second book on the subject, and barring any sudden changes in the security landscape, this book should hold it's value for some time to come.

 
5.0

Security Warrior Review

By Ali Rahbar

from Undisclosed

Comments about oreilly Security Warrior:

This is one of the first book that talk about the fundamentals of reverse

engennering.It is true that you can find can all the books subjects on the net but for finding and understanding them you should waste a lot of time and effort (to seek different messageboard and reversers site). This book

has done the hard works for you and you can read everything classified and in great details. I recomend it for everyone interested in security and if you already know all the topic in this book I still recommend you to read this book

for a fast and well organized review.

Displaying reviews 1-5

Back to top

 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $35.99
Formats:  APK, DAISY, ePub, Mobi, PDF
Print & Ebook: $49.45
Print: $44.95