Consultant, Buckinghamshire, UK
By the authors providing a 'hacker' perspective, readers will more fully understand the ramifications of having an insecure computer, server, network, program, database and or policy. ... [T]here are important discussions of the non-technical kind [of insecurity] like policy, which is too often overlooked in many organizations. ... What is most impressive about the book is its outlines of specific exploits and attacks with prescribed defenses. ... Coupled with good illustrations and detailed explanations[,] this is a great resource... - E-Streams, Vol. 7, No. 9, September 2004 This is a must-have book for those preparing for the CISSP exam and for any information security professional. - Zentralblatt MATH 1054, May 2005