Consultant, Buckinghamshire, UK
""By the authors providing a 'hacker' perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. … [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. … What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. … Coupled with good illustrations and detailed explanations[,] this is a great resource…"" - E-Streams, Vol. 7, No. 9, September 2004 ""This is a must-have book for those preparing for the CISSP exam and for any information security professional."" - Zentralblatt MATH 1054, May 2005