Network Security Hacks, 2nd Edition
Tips & Tools for Protecting Your Privacy
Publisher: O'Reilly Media
Final Release Date: October 2006
Pages: 480

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

Table of Contents
Product Details
About the Author
Recommended for You
Customer Reviews


by PowerReviews
oreillyNetwork Security Hacks, 2nd Edition

(based on 1 review)

Ratings Distribution

  • 5 Stars



  • 4 Stars



  • 3 Stars



  • 2 Stars



  • 1 Stars



Reviewed by 1 customer

Displaying review 1

Back to top

(2 of 4 customers found this review helpful)


Network Security Hacks 2nd edition

By Frederick J Eccher Jr

from Undisclosed

Comments about oreilly Network Security Hacks, 2nd Edition:

Title: Network Security Hacks

Subtitle: Tips & Tools for Protecting Your Privacy

Second Edition: October 2006

Series: Hacks

ISBN 10: 0-596-52763-2

ISBN 13: 9780596527631

Pages: 478

By Andrew Lockhart

The book starts with credits, then a preface before 12 chapters and an index. There were 14 contributors including the author according to the credits. The preface states there are 123 hacks in this edition. There were no errors that I found except for one minor one in the preface. Look at the thermometers that indicate the complexity of the hack on page xix. Does it look like the beginner and moderate icons are the same? No big deal, they are different in the text next to the actual hacks.

I do not worry too much about errors until they make me feel like the author[s] may not really be expert in the area they are writing about but all these hacks look good to me.

The book is balanced and starts with two chapters about Unix Host Security and Windows Host Security. They are both extremely well written and have very useful hacks.

This book is light reading. I read it in three days, just a couple of hours a day. The style is light and easy to enjoy. The flow of the style makes it hard to believe that multiple authors are involved in the writing. It seems like one person wrote it.

I liked the following chapters quite a bit:

Chapter 6 Network Security

Chapter 7 Wireless Security

The best chapters were hard to determine, all the chapters were excellent. Here are three that I thought were best:

Chapter 9 Monitoring and Trending

Chapter 11 Network Intrusion Detection

Chapter 12 Recovery and Response

Chapters 11 and 12 were the very best in the book, depending on whether you were more interested in detecting intruders or responding to them.

This book is worth 5 stars and every penny charged for it, taking everything into account. This book will pay for itself over and over. The first time I realized that the book would pay for itself right away was

40. Use the web with fewer passwords: Pwdhash and Remote PwdHash

41. Encrypt your email with Thunderbird

I also liked the sources of the hacks: Stanford and Harvard were cited. I thought this was good work academically and both security centers are heavy hitters with lots of quality talent writing software.

Well done.


Frederick J Eccher Jr


M.S. Management of Information Systems

A.B. Psychology

B.A. Biology

CIO, Community Partners

President, Board of Directors, Saint Louis Visual Basic Users Group

Displaying review 1

Back to top

Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook:  $31.99
Formats:  APK, DAISY, ePub, Mobi, PDF
Print & Ebook:  $43.99
Print:  $39.99