File Size: 393 KB
Print Length: 31 pages
Publisher: (game)land company; 1 edition (August 21, 2012)
Publication Date: August 21, 2012
Sold by: Digital Services LLC
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Enabled
Best Sellers Rank: #310,162 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #156 in Kindle Store > Kindle Short Reads > 45 minutes (22-32 pages) > Computers & Technology #307 in Books > Computers & Technology > Internet & Social Media > Hacking #380 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
Think of this book as a buyers guide for some very cool hacking tools. It has an explanation of what the tools do, and why you should use them. This is NOT a how to book, but merely a buyers guide to hacking tools, what they do, and how much they cost. For what it is, it's a great, short read and I found a few new tools in here that I wasn't aware of.
I can't rate it too low because it was something completely different from what I wanted to know. Plus, it was a free kindle download. Had I paid for it I would have been upset.What you get in this book is basically a list of product reviews. There is no real information about hacking. It mostly discusses what you need to buy to gain access to a network.If that's what you're looking for it's worth looking at. And you can't beat the price!
I was disappointed by the limited information provided by this book. It was as if the author skimmed a catalog and summarized the product descriptions of a few items he liked. I would have better served by a link to the catalog he looked at.
A brief explanation of interesting hacking devices - somewhat overpriced, but even for inexperienced readers worth reading to know what is out there that can invade your privacy or steal information you might think is perfectly secure. It would be worth the cost if it had listed enough devices for the explanations to cost a little less. If you are an experienced hacker, it is an overpriced catalogue of 14 items you probably could write your own review of yourself. The value of this truly depends upon your knowledge of the fourteen devices reviews here. The problem with recommending it to the inexperienced hacker is that I'm not sure what book to recommend so that you will fully understand the technical language used in this catalogue. Perhaps another reviewer has a good recommendation of a good book for that. If the author just added that information - or f he does in a future edition, it would be worthy of five stars. No doubt the people who understand the technical jargon are aware of all fourteen devices and have their own opinion of them, meaning this "magazine" is written for people who will find it difficult to understand completely. I do recommend it despite this significant problem, it is worth what the inexperienced readers will learn.
Neat stuff. It was presented well, and a good centralized repository of some fairly basic information. The upside of this is that there really aren't many collective descriptions of hardware devices out there, and this puts them in one place. Probably outdated at this point.
I liked this book. It is a good quick read and reference. I will say it is a bit dated, however and should be updated. Author prices this right for the content. If you want a good reference book for some key hacking tools - this would be it.
An interesting overview of some of the tools that are available to hackers and what to look out for. It was not what I expected as it is more a laundry list of tools and the various uses for them.A pretty good intro to what is available and what can be done
This is an interesting overview of tools that could be useful for white hat penetration testing. The author presents a variety of different tools you need to keep an eye out for on your network if you are responsible for securing your company's network from intruders.
The Hacker's Briefcase (Hacker Magazine Book 1) DIY Jewelry Making Magazine #33: 8 amazing leather and chains jewelry making tutorials (DIY Beading Magazine Book 34) The GIRLS of PENTHOUSE MAGAZINE COLLECTOR'S GUIDE: EVERY COVER OF EVERY MAGAZINE 1977-2014 WEIRD WOMEN Of Weird Tales Magazine: OVER 185 Vintage Pulp Magazine Covers CARtoons Vol. 1: THREE COMPLETE ISSUES OF THE CLASSIC 1970s AUTOMOTIVE HUMOR MAGAZINE: OVER 2OO PAGES OF AUTOMOBILE ANTICS, CRAZY CARS AND HILARIOUS HOT-RODS (MAGAZINE CLASSICS) PENTHOUSE MAGAZINE COLLECTOR'S GUIDE VOL. 3: 1990-1999: Every Issue From January, 1990 Through December, 1999 (PENTHOUSE MAGAZINE COLLECTOR'S GUIDES) CARtoons Vol. 2: THREE COMPLETE ISSUES OF THE CLASSIC 1980s AUTOMOTIVE HUMOR MAGAZINE: OVER 18O PAGES OF AUTOMOBILE ANTICS, CRAZY CARS AND HILARIOUS HOT-RODS (MAGAZINE CLASSICS) The SHADOW: Vintage Pulp Magazine Covers: OVER 185 Classic Pulp Magazine Covers FromThe 1930s & 1940s The Best of Paddler Magazine: Stories from the World's Premier Canoeing, Kayaking and Rafting Magazine Hacking University: Freshman Edition Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beginners, Computer ... (Hacking Freedom and Data Driven Book 1) Hacking: Tapping into the Matrix Tips, Secrets, steps, hints, and hidden traps to hacking: Hacker, Computer, Programming, Security & Encryption 2600: The Hacker Digest - Volume 2 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws CEH v9: Certified Ethical Hacker Version 9 Practice Tests Hacking: Secrets To Becoming A Genius Hacker: How To Hack Smartphones, Computers & Websites For Beginners Certified Ethical Hacker (CEH) Cert Guide The Car Hacker's Handbook: A Guide for the Penetration Tester A Hacker Manifesto XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation