Used price: $5.99
Buy one from zShops for: $13.89
When reading VaDS, it's important to remember that all of the authors have some sort of relationship with San Antonio-based voice security company SecureLogix. That's ok, as Foundstone is the powerhouse behind the successful "Hacking Exposed" book series. Some parts of the book read like commercials for SecureLogix products like TeleSweep and TeleWall, but the authors largely focus on non-proprietary solutions to voice security.
VaDS is strongest when it speaks solely to voice security issues, and, to a lesser degree, network infrastructure. I learned quite a bit about tapping phones (ch. 11), voice mail abuse (ch. 14), and voice-data convergence (ch. 5). Chapters on broadband infrastructure and exploitation were helpful. Even though the final chapter seemed out of place, its intriguing coverage of cyber law kept my attention.
Less helpful were the chapters covering general security issues, such as cryptography (ch. 18), malware (ch. 19), sniffing (ch. 20), scanning (ch. 21), passwords (ch. 22), firewalls (ch. 23), IDS (ch. 24), and denial of service (ch. 26). This material is so well-covered elsewhere that its appearance did little to help VaDS distinguish itself. Chapter 27 was an exception, with its succinct discussions of popular Microsoft IIS web server vulnerabilities.
Aside from including well-worn material, VaDS suffered slightly from a few technical mistakes. Explanations of buffer overflows in chapter 4 needlessly associated them with TCP-based sessions. UDP-based buffer overflows are exploited regularly. The author of this chapter also seems to believe that buffer overflows are a problem because they overwrite "user ID and privilege information" on the stack. That's rarely the case; subverting return pointers is the problem. Chapters 8 and 15, describing voice protocols like H.323, were difficult to understand, and ch. 18 (p. 283) makes an unsubstantiated claim that "a well-known Mid-East terrorist was discovered to be using steganography." Typos on pp. 155-156 appeared, and port 443 was replaced by 444 on p. 69.
Overall, VaDS marks a welcome contribution to the information security community. I plan to include it in my tier two security analyst reading list, with recommendations to concentrate on its voice-related content. Hopefully the second edition will strip out the unnecessary network security coverage found elsewhere, and include more excellent explanations of voice security issues.
(Disclaimer: I received a free review copy from the publisher.)
Used price: $3.00
Buy one from zShops for: $5.80
So, while this book may not be for everyone, I still give it four stars (even though I haven't read it cover to cover myself) because the information is very pertinent to those who are just now exploring their faith. As I tell my students, there is coming a time when it will no longer be OK to borrow their parents' faith. In fact, it is time to own their own faith. A book like this introduces some different philosophies that they will be inundated with in the not-so-distant future. Mature junior highers should be given this book before they attempt to share their faith with the cultist at the door.
Used price: $2.69
Michael White's highly entertaining introduction to this horrifying figure concentrates mostly on the first 'fact' - it is, after all, easier to list someone's biographical failures than explain why the closing symphony of the Gotterdammerung sounds both like the terrible end of the world and the unaccountable essence of sublimity (I'm afraid he gets you talking this way).
And so, amusingly, we are told about Wagner's cruelties, caprices, infidelities, and, of course, his anti-Semitism; and given an interesting guide to some of the more sensible influences (eg Schopenhauer, Proudhon) on Wagner's loony philosophies, and a sound cultural and political background.
This proper emphasis on the man rather neglects the artist, and while White quite rightly argues the impossibility of separating both, you don't get much sense of the sheer magnitude of Wagner's achievement (using the odd big word isn't enough), or what it means for us, the listener, to be entranced by the works of such an ogre.
That said, the sheer readability and cheek of this book, as with all others in this series, is great fun, even if it doesn't achieve its aim (to make you master of the subject) as the book on Post-Modernism did.
The chief joy of this series, however, is the illustration, and Kevin Scott keeps up the remarkably high standard, fusing dada, colage, pop art, with some astonishing pastiche and cartoon work, which means every page, even if you are dissatisfied with its contents, is a pleasure to read.
List price: $17.95 (that's 30% off!)
Used price: $9.00
Buy one from zShops for: $11.59
If you have sailing and multihull experience this book is not for you.
Used price: $5.95
Collectible price: $5.68
Buy one from zShops for: $22.95
The definitive story of Kevin Mitnick has still not been told--this is an interesting story, but it is hardly conclusive. Furthermore, given the author's attitude--he's got an ego a mile wide--it's difficult to accept everything in this book at face value. Certainly, Shimomura and Markoff had every incentive during their journey to work towards creating an exciting story. A critical reader must consider the possibility that they manipulated events in order to increase sales of their expected book. It is certainly possible that this did not happen, but how can you know?
A greater understanding of what Mitnick represents is important in developing an ability to think in useful information security ways. He's become such a cultural icon--a criminal genious in the eyes of one side, and a victimized innocent on the other. Neither of these simplistic views is accurate. I believe that Mitnick probably is a genius, but not in technical terms. He's truly one America's great con-men, and his story teaches us a great deal about how gullible normal people can be, and how easy it is for a smooth-talker with selfish motivations to manipulate normal people. There are a lot of lessons to be learned from a study of Mitnick, although the writers of this text provide minimal assistance in helping the reader draw useful conclusions about the story. They are much more concerned with showing how incredibly clever Shimomura is, purportedly tracking Mitnick from ISP to ISP across the Internet, and eventually right to his doorstep with a junior G-man RDF unit.
A Mitnick story that I believe is much more balanced is Jonathan Littman's book, "The Fugitive Game : Online With Kevin Mitnick," which is unfortunately out of print. While Littman's personal relationship with Mitnick--Mitnick apparently just likes him--also should be a datapoint in your evaluation of what actually happened, I think he takes care to make any potential bias clear, and to avoid it.
Littman raises some interesting questions about Shimomura. I summarize my feelings about the purported Mitnick attack on Shimomura like this: 1) Shimomura makes it widely known that he has software on his Internet server that is of interest to hackers. 2) He leaves an incredibly obvious security hole open on his Unix server that any Unix newbie would have known to plug. 3) He sends the syslog (system logging) data to another host, which just so happens to be REALLY TIGHT. If he's capable of capturing syslog records in such a secure and non-compromisable way, why did he leave r-services running on the server with the source code? We will probably never know if he actually created a honeypot with the intention of entrapping Mitnick and writing a book about it, but what he did was fully consistent with such a plan. Fascinating, huh? I guess you'll need to read the book to make up your own mind, but if that is what really happened, how do you feel about subsidizing it through reading the book?
We'll also never know if Mitnick was really the one who hacked into Shimomura's Sun box using a technique that was previously considered theoretical. Somebody did, and Mitnick certainly was aware of it, but I personally don't believe that Mitnick is technically capable of writing such hack code himself, and I'm not sure that he was the one to perform the exploit. The best description I know of this exploit is found in Stephen Northcutt's book, "Network Intrusion Detection."
So it is an important story that can help you develop a better understanding of Internet security, and both security experts and non-specialists could benefit from having a realistic view of the significance of Mitnick. For the time being, this is the most detailed book available, and as an autobiographical account of one the participants in Mitnick's takedown, the book will always have a certain historical significance. But be an especially critical reader with this one. Think through the motivations of the authors, and consider the possibility that Mitnick is a genius at social engineering, but only an average technician. If that's the case, then what really did happen? Read Shimomura's account, and make up your own mind.
I liked having the technical details included. Far too many books about computer crime include every gory detail of dumpster-diving and skim lightly over what happens on the computer. After all, people reading these books are likely to be computer people!
As an author myself, I understand the need to promote yourself. I don't understand the need to pepper the book with the minutia of your day-to-day life, and I'm sure my readers couldn't care less what I eat. I certainly hope that in the future, Shimomura learns to keep his self-promotion on the dust jacket, and to control his obvious contempt for everyone he works with.
All in all, I'd recommend this book. It has much better technical information than Jonathan Littman's book about Kevin Mitnick and provides a much different slant on Mitnick. If you're really curious, read both.
He's also a ski-bum so he's not all that bad :-)
This book details the story of what happened when the "world's most wanted hacker", Kevin Mitnick, payed an uninvited visit to Shimomura's computer and then taunted him about afterwards. He lived to regret it.
Shimomura is a curious mix of characteristics. The arrogance and show-off nature of his character are offset by his very real achievements, some natural goofy charm (especially the relentless California slang) and in the end this reader was left with admiration for his skills, jealousy of his career and a certain sense of relief that I never got into computer-cracking in the first place.
Unix fans will delight in the Unearthed Arcana displayed by Shimomura and I suspect one or two victims of computer crime may have scribbled down the odd technical note when reading his descriptions of the cyber-forensic investigation he performed on his violated computer.
There is even a certain amount of philosophy which adds depth but is not too pretentious. Shimomura names his computers but makes it clear that that is simply pragmatic, they are not his friends and he prefers people to computers. He also thinks people should not share a room with the moving parts (disk drives, fans etc) and so banishes the boxes to the cupboard and allows only the keyboard and monitor into his presence. As I sit in the white noise hell of my office I sometimes wish my elders and betters felt this way.
The story has some amusing twists and turns but is not as satisfying a story as The Cuckoo's Egg. On the other hand it is bang up-to-date and the book is accompanied by it's own web site.
I enjoyed the book and it's recommended reading for anyone interested in computer crime.
Used price: $2.42
Collectible price: $18.99
Buy one from zShops for: $2.00
Used price: $1.97
Buy one from zShops for: $1.95
List price: $24.95 (that's 30% off!)
Used price: $3.95
Collectible price: $11.64
Buy one from zShops for: $10.00
Of particular concern is White's over-arching view of Victorianism. In an early chapter, White claims that "Victorianism worked. Rates of divorce and illegitimacy remained low." An interesting comment but one which is not at all supported by any evidence which White provides. Low rates of divorce and illegitimacy are not evidence of happiness and/or lack of sexual license. My understanding---drawn from British material---is that abortions were frighteningly common during the late nineteenth century and that varying forms of birth control were becoming more widely available (rates of illegitimacy are thus a dicey monitor to use to assess whether Victorians lived by their own sexual standards). Also, as any historian can tell you---divorce was uncommon simply b/c it was extraordinarily difficult to obtain. The absence of divorce in a society (esp. one where death rates sharply curtailed the length of marriages anyway) should not be read as evidence of high social/sexual standards and/or contentment with these standards.
My greatest complaint, however, is White's clear difficulty with the idea that women can assume positions other than passivity as far as sex is concerned. White is dismissive of the concept of date rape and he quotes Robert BORK to support the idea that concern abt date rape has been overdrawn (oddly enough just because a woman agrees to be kissed or fondled does NOT mean she is willing to have sex---and the same is true of men-it is not extraordinary for young women and young men to want to give their consent to sexual acts).
White also seems dismissive of the idea that greater sexual freedom brought any type of happiness or pleasure to men or women. He cites comments from bohemians who decided that they preferred non-intellectual women but ignores the great intellectual bohemian relationships of the period completely.
What kind of an historian ignores evidence? Not a very good one, I'm afraid. Give this book a miss.
Used price: $159.00
Buy one from zShops for: $167.68
Used price: $12.99
That convergence is the focus of Voice and Data Security. About a third of the book addresses the fundamentals of voice and data security, covering topics such as cryptography, sniffing, and spoofing. The rest of the book deals with securing digital and voice assets.
As an example, PBX and mail fraud are huge problems facing corporate America. Yet while most companies are aware of the situation, many organizations don't do all they can to secure their voice systems. This book contains an excellent policy and audit checklist on how to set up a corporate PBX policy. Items such as protection management, standards and procedures, technical safeguards, and incident response are discussed in the checklist, which alone is worth the cost of the book.
A single unauthorized modem in a corporate network will undermine firewalls, cryptography, and all other protection mechanisms. Thus, the authors cover how war dialers and telephone line scanners can be used to ensure that the back doors that unauthorized corporate modems create are closed.
Voice and Data Security is valuable to those needing a good introduction to the core ideas and security repercussions involved with the convergence of voice and data systems. It speaks volumes.