Used price: $6.50
Buy one from zShops for: $10.96
Do not confuse this series with an average graphic novel. 6 years in the making (with some chapters taking over a year to develop), Mr. Roach's incredibly well written 900-page-epic is full of incredibly complex and well thought out characters, plot twists, action, and overall adventure. Somehow, through all the plots twists and turns, he manages to never lose the reader, nor contradict himself, all the while linking the story back to various prophecies.
Mr. Roach is clearly a scholar, and both his research and creativity shine through on every page.
While the art is at times crude, and while on a graphical level he may not be as good as others in the industry, he makes up for it and even goes beyond it through his storytelling and incredible plot. In the armageddonquest series, the black-and-white art is there to compliment the story, not drive it, and in this way, Mr. Roach has created a story that really sucks you in.
900 pages is a lot for any man to write, and a 6 year project is enough for a lifetime, but I certainly hope this is not the last I see of Mr. Roach's work. I'm hooked.
List price: $45.00 (that's 30% off!)
Used price: $31.27
Collectible price: $100.59
Buy one from zShops for: $30.14
Used price: $14.95
List price: $34.95 (that's 30% off!)
Used price: $17.95
Collectible price: $23.81
Buy one from zShops for: $24.29
Used price: $13.50
List price: $49.95 (that's 30% off!)
Used price: $24.00
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...
Used price: $179.99
Buy one from zShops for: $75.00
You'll really find everything you want in it, including the composition of all the buffers and solutions, the new protocols for high-tech biology (FLIM-FRET), some paragraphs about bioinformatics and more.Incredibly precise, this book is consequently a big book (3 huge volumes), so better know exactly wath you're looking for before opening it!
The must have of every lab!
Used price: $16.97
Collectible price: $18.00
List price: $15.95 (that's 30% off!)
Used price: $6.94
Buy one from zShops for: $10.52
Joseph Amato, Professor of Intellectual and Cultural History at a small college in southwestern Minnesota, tells an interesting, if familiar, tale. Dust was long defined by its occupation of the lowest position on the scale of the visible ('pollen' is the Latin word for 'dust'), and it symbolized insignificance and near-nothingness. Then came Western - now global - science. Dust became a multiform heap of material objects within a certain range of sizes ("With so much known about the invisible, dust can never again be ordinary," he writes), while at the same time ever more powerful instruments pushed ever further toward zero the notion of the infinitesimal. Meanwhile, civil authorities find themselves in a constant scramble to adapt to science's new insights into the implications for human well-being.
Prof. Amato is at his best in his survey of these societal responses to the news from the microcosm, and has interesting and upbeat things to say about the history of health, housekeeping, and hygiene. (He is much weaker on the scientific and intellectual side of things. I found particularly regrettable his neglect of Lovejoy's classic *The Great Chain of Being* - a work he cites in the notes but shows no sign of having assimilated.)
But the reader who arrives at the end of this brief volume is likely to be surprised at the author's take on the prospects of our increasing mastery of what is minute affecting our imaginative lives. In an essay written in the early twenties entitled "Subject-Matter of Poetry," Aldous Huxley expressed amazement that "The subject-matter of the new poetry remains the same as that of the old. The boundaries have not been extended. There would be real novelty in the new poetry if it had, for example, taken to itself any of the new ideas and astonishing facts with which the new science has endowed the modern world. There would be real novelty in it if it had worked out a satisfactory artistic method for dealing with abstractions. It has not." The concluding chapter of *Dust*, entitled "Who Will Tremble at These Marvels?" attempts to explain why not, and in doing so takes into a minor key what had till then seemed to be a work written in a major mode. This chapter, together with the touching ten-page memoir of his mother's relation to dust presented in an appendix, are the best things in the book.
This book will save the newcomer years in language school! Outstanding job gentlemen!