Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts
By: Dr. Ali Jahangiri
Publisher: Dr. Ali Jahangiri
Publication Date: October 2009
Reviewed by: Michael Feld
Review Date: January 2010
First, I want to offer a full disclosure; I am a consulting network engineer and I use many of the tools and procedures outlined in Live Hacking to support my clients.
Live Hacking is a useful reference for anyone interested in computer security. The book is well written, well organized and provides a wealth of information for anyone who wishes to explore computer and network security. Dr. Jahangiri clearly defines the steps involved in the hacking lifecycle from reconnaissance to covering ones tracks. Dr. Jahangiri provides a clear and concise explanation of critical terminology and concepts.
The organization of Live Hacking proceeds along the hacking lifecycle mentioned above. In each chapter Dr. Jahangiri provides detailed screenshots of the many applications and utilities mentioned. These screenshots are an excellent tool to aid the reader in the learning of the various steps involved in the hacking lifecycle. The author’s writing style is strong and he often provides appropriate bibliographic references.
Live Hacking deals with a complex subject, one that is always changing and evolving. There are a significant number of books currently on the market dealing with the topic. However, because of the complex, ever changing nature of this topic, many of those network/computer security books are far too technical for the average reader. These books are targeted only to highly skilled security individuals. It is heartening to find a book that allows the “non-engineer” to understand the fundamentals of both hacking and computer/network security.
Dr. Jahangiri clearly explains both the procedures followed by a hacker as well as the reasons for hacking into a system. He also shows how a system administrator or user may counter such threats. Although I feel that Live Hacking does provide a basic foundation for countering many hacking threats, it nonetheless assumes a significant amount of pre-existing knowledge on the part of the reader. It would be helpful if the book provided the reader with a better understanding of key concepts such as the OSI model and the relevant details of routing protocols. With the inclusion of this information, the reader would gain deeper understanding and would be better able to keep abreast of the ever-changing computer/network security environment. Regardless, Live Hacking provides a valuable and necessary tool to fight hackers.
Quill says: We recommend Live Hacking to anyone who maintains networks, to anyone interested in how hacking works, and to anyone who is interested in networks and computers.
For more information on Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts, please visit the book's website at: LiveHacking.com