Used price: $15.95
Buy one from zShops for: $29.99
The essays were written over the past decade for a medical audience, but their subject matter and the range of materials Silverman brings to the discussions make them useful, and important reading for a much larger public. Silverman centers the debates in medicine around the social consequences of medical practice and covers such issues as the increasing and "gross maldistribution of power between patient/family and medical techocrat; the problems caused by a "confusion of goals" within medicine, and the process(es) by which medical authority is established. In so doing, he raises key questions such as, what's the new knowledge for, or, when is medicine's benevolence on behalf of patients/families misplaced. As a collection of key issues in the development and application of medical knowledge, the present volume provides a wealth of case studies which could be probed by scholars in fields such as anthropology, sociology, public policy and philospphy.
Integrity, courage, clarity, and an impressive breadth of scholarship characterize the essays and his afterthoughts. He has truly mastered the art of explaining the most complex and critical issues in medicine in terms that are understandable, and useful to the public at large.
The essays were written over the past decade for a medical audience, but their subject matter and the range of materials Silverman brings to the discussions make them useful, and important reading for a much larger public. Silverman centers the debates in medicine around the social consequences of medical practice and covers such issues as the increasing and "gross maldistribution of power bewteen patient/family and medical techocrat; the problems caused by a "confusion of goals" within medicine, and the process(es) by which medical authority is established. In so doing, he raises key questions such as, what's the new knowledge for, or, when is medicine's benevolence on behalf of patients/families misplaced. As a collection of key issues in the development and application of medical knowledge, the present volume provides a wealth of case studies which could be probed by scholars in fields such as anthropology, sociology, public policy and philospphy.
Integrity, courage, clarity, and an impressive breadth of scholarship characterize the essays and his afterthoughts. He has truly mastered the art of explaining the most complex and critical issues in medicine in terms that are understandable, and useful to the public at large. Individually essays would serve a public good as op-ed pieces in the New York Times, as a collected work they reinforce the importance of a medicine that is public spirited.
Suzanne Calpestri, Librarian The George and Mary Foster Anthropology Library University of California, Berkeley
Used price: $4.36
Buy one from zShops for: $5.88
Used price: $36.36
Buy one from zShops for: $36.36
List price: $19.95 (that's 30% off!)
Used price: $8.00
Collectible price: $13.89
Buy one from zShops for: $13.82
List price: $17.95 (that's 30% off!)
Used price: $12.52
Buy one from zShops for: $11.50
Bird species include water birds, birds of prey, hummingbirds, songbirds, etc. that residents or visitors to the southwest may encounter.
The book is very well organized and is useful as a quick reference when viewing birds.
Used price: $14.77
Used price: $30.00
Buy one from zShops for: $159.97
List price: $49.95 (that's 30% off!)
Used price: $24.00
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...