Buy new:
-45% $29.99
FREE delivery Friday, May 17 on orders shipped by Amazon over $35
Ships from: Amazon
Sold by: EfiStore
$29.99 with 45 percent savings
List Price: $55.00

The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Friday, May 17 on orders shipped by Amazon over $35. Order within 13 hrs 33 mins
Only 1 left in stock - order soon.
$$29.99 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$29.99
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Ships from
Amazon
Sold by
Sold by
Returns
30-day easy returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$10.99
Get Fast, Free Shipping with Amazon Prime FREE Returns
Book in good condition. Wear on corners and edges. Ships direct from Amazon! Book in good condition. Wear on corners and edges. Ships direct from Amazon! See less
FREE delivery Friday, May 17 on orders shipped by Amazon over $35. Order within 13 hrs 33 mins
Only 1 left in stock - order soon.
$$29.99 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$29.99
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

Hacking Exposed 7: Network Security Secrets and Solutions 7th Edition

4.5 4.5 out of 5 stars 206 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$29.99","priceAmount":29.99,"currencySymbol":"$","integerValue":"29","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"bX9Kt%2Fug1iGvl7Nz1DPaUJA6ALW8kDdiVfB6fCYb%2FRdQE997B7hAmJT8clZL3iP8KGPw5jaNvQ%2FCgYe7%2Bqb9sjZrYYYFPycxGlV3xAj5PUgi6Q20C9vKELkQ0fY8Y5cbedIfL0hTnKMyh2ylB6mfos%2FD%2FL03Ide3j6iHp8jQFc9pxtPSxNl9patoQFy0pKke","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$10.99","priceAmount":10.99,"currencySymbol":"$","integerValue":"10","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"bX9Kt%2Fug1iGvl7Nz1DPaUJA6ALW8kDdiItA93nxCF3K3BTJDRkXMOugcGnkwq%2BJHTj0xINScA8jb%2BhqqkD3grnILUft6ibqPNXL2huPwjShdphyTU0r81PWBvQh8Uw9mR1NSCPcJ8SCeT0iZp4daS7ZTJIU0DLd9MXUhukQ6THNbuRlNN%2BgamoIsTryTzZZf","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself
Read more Read less

Amazon First Reads | Editors' picks at exclusive prices

Frequently bought together

$29.99
Get it as soon as Friday, May 17
Only 1 left in stock - order soon.
Sold by EfiStore and ships from Amazon Fulfillment.
+
$44.05
Get it as soon as Friday, May 17
Only 15 left in stock - order soon.
Sold by Apex_media🍏 and ships from Amazon Fulfillment.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
One of these items ships sooner than the other.
Choose items to buy together.

Editorial Reviews

From the Publisher

Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004.

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

About the Author

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group. He has assisted companies ranging from newly minted startups to members of the Fortune 50 in addressing information security challenges and opportunities for over a dozen years.Joel's background includes roles as an executive, technical consultant, and entrepreneur. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Joel also co-founded security software and services startup Foundstone, Inc. He has also held positions as a Manager for Ernst & Young, Chief Strategy Officer for Leviathan, security columnist for Microsoft TechNet, Editor at Large for InfoWorld Magazine, and director of IT for a major commercial real estate firm. Joel has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM), as well as organizations including CERT, CSI, ISSA, ISACA, SANS, private corporations, and government agencies such as the Korean Information Security Agency (KISA), FBI, and the RCMP. Joel Scambray is the co-author of all 6 editions of Hacking Exposed. He is also the lead author of Hacking Exposed Windows and Hacking Exposed Web Applications.

George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Stuart McClure, CNE, CCSE, Global CTO for McAfee/Intel, is responsible for a nearly $3B consumer and corporate security products business. During his tenure at McAfee, Stuart has also held the General Manager position for the Security Management Business for McAfee/Intel, which enabled all McAfee corporate security products to be operationalized, managed, and measured. Alongside those roles, Stuart has also run an elite team of good guy hackers inside McAfee called TRACE that discovered new vulnerabilities and emerging threats. Previously, Stuart helped run security at the largest healthcare company in the U.S., Kaiser Permanente. In 1999, Stuart was also the original founder of Foundstone, Inc., a global consulting and products company, which was acquired by McAfee in 2004.

Joel Scambray, CISSP, is Managing Principal with Citigal as well as Co-Founder of Consciere LLC. He was previously chief strategy officer for Leviathan Security Group, an information security consultancy. He was a senior director at Microsoft Corporation, where he led Microsoft's online services security efforts for three years before joining the Windows platform and services division to focus on security technology architecture. Before joining Microsoft, Joel co-founded security software and services startup Foundstone, Inc., and helped lead it to acquisition by McAfee. He has spoken widely on information security at forums including Black Hat, I-4, and The Asia Europe Meeting (ASEM). Joel is the co-author of all five editions of Hacking Exposed and lead author of Hacking Exposed: Windows, currently in its third edition, and Hacking Exposed: Web Applications, currently in its second edition.

George Kurtz, CISSP, George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee’s Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee’s CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Product details

  • Publisher ‏ : ‎ McGraw Hill; 7th edition (August 1, 2012)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 768 pages
  • ISBN-10 ‏ : ‎ 0071780289
  • ISBN-13 ‏ : ‎ 978-0071780285
  • Item Weight ‏ : ‎ 2.87 pounds
  • Dimensions ‏ : ‎ 7.4 x 1.5 x 9.1 inches
  • Customer Reviews:
    4.5 4.5 out of 5 stars 206 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Stuart McClure
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.5 out of 5 stars
4.5 out of 5
206 global ratings
damaged book
1 Star
damaged book
Paid for new got damaged book / signs of a spill.
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

Reviewed in the United States on February 8, 2024
The book arrived quick and in good shape (purchased it used), as well as having a nice handwritten message on it. I highly recommend ordering this book from Deckle Edge LLC, if they have some available still.
Reviewed in the United States on November 18, 2012
Overall an excellent book and easy to understand. I have always loved the Hacking Exposed books. The books are designed to be an organized, easy reference for anyone. The books provide detailed explanation of different types of attacks and then go on to explain the countermeasures for each. It makes a great resource for my CEH preperation.
13 people found this helpful
Report
Reviewed in the United States on October 9, 2014
Overall a good book. It has been updated many times over many years so some of the info is very dated. For example, there is a chapter on hacking modems. Our company has zero modems but I suppose some companies still have them. I just skimmed over that. Also, some of the threats discussed have long been patched by everybody and effectively eradicated. There may be some educational foundation for discussing but the book is long already so I would prefer they be removed. I liked the newer chapter on cell phone hacking and jail breaking.
3 people found this helpful
Report
Reviewed in the United States on May 21, 2016
Man! This book Is actually a college course on the ins and out of Hack A Mania and how to resolve the virus Rootkit dilemma. This book shows you the what when and why a virus or rootkit are on the attack, and the steps to take. It Has Wireless Routing Solutions if you have a router that mysteriously locks up or crashes into oblivion! The book shows you how routers are infected, what hackers use, and the remedy! Hacking Exposed 7 Network Security Secrets and Solutions is a must have if your looking for
"A Total Solution Resource Book" This Is It!
4 people found this helpful
Report
Reviewed in the United States on September 1, 2012
I have just begun reading this book. This is a treasure trove of information on how hackers work and what to do about it. the examples are easy to follow and understand.
I highly recommend this book for any information security professional. While I am not a penetration tester, I believe this book and the rest of the series is vital to any pen testers toolbox.
7 people found this helpful
Report
Reviewed in the United States on March 19, 2014
I'm in vulnerability assessment and pen testing field started last year. I seldom buy computer books these day but this is one of the exceptions.
Company paid $5000 for my SANS 560 course but not willing to spend the money to buy this book so I got it for myself.
I'm still reading it and all I can said is, go get yours.
15 people found this helpful
Report
Reviewed in the United States on February 18, 2019
I recall the first time I read a Hacking Exposed book. Learned some new things. By the time this tome rolled out I had read portions of it in prior editions and there wasn't that much new material. This was a few years ago and now we're happily running Win 10. So many of the basics are still the same though. Still a decent read.
Reviewed in the United States on October 25, 2013
Covers some important material you may not always see anywhere else. This book is a helpful reference to go getters involved in network security, and I found the topics discussed were better presented and clearly expressed than longer articles dealing with similar material. A real solid starting point with fun to try examples!
One person found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Alessandro P.
2.0 out of 5 stars Nel 2024 e' un libro inutile.
Reviewed in Italy on March 26, 2024
Libro del 2012 che non ha subito aggiornamenti.
100% degli exploit fixati da un secolo.

Per farvi un paio di esempi, ci sono riferimenti ad exploit su windows 2000 e xp, e la sezione android e' ferma ad android 2.

Non capisco perche' venga ancora venduto, il bello e' che sono stato obbligato a comprarlo a livello universitario.

Sia chiaro il concetto di fondo e' sempre lo stesso, la tutto il resto e' completamente inutile ormai.
Deep
5.0 out of 5 stars A great book. Great service by Amazon
Reviewed in India on January 4, 2016
This is a must for all those who want to learn Hacking. A great book. Great service by Amazon.
Boston2000
5.0 out of 5 stars Getting ready for the Certified Ethical Hacking exam
Reviewed in the United Kingdom on October 10, 2015
Having just passed my Certified Ethical Hacking Exam (CEH), I wanted to share how reading this book prepared me for the exam. Reading Hacking Unleashed 7 gave me a head start when I entered my 4.5 day training course running up to the exam.

EC-Council recently updated CEH to version 9. Although the new subject Cloud Computing is not included in this book, the new subject Mobile is. I can’t say I have read the official CEH book (it has not been printed yet and reading from the PC screen is not my thing), so I can’t really compare the two. I did browse through the CEH book and, for what it is worth, it feels like a slide deck, unlike Hacking Unleashed, which is really a well written book.

If you want to pass the CEH exam, then I recommend that you first learn the basics (e.g. CISSP and OS knowledge). Once you got that covered then you can start with this book to basically learn everything for the exam. I can imagine that you’ll still read the EC-Council book, but Hacking Unleashed 7 will make you understand how things work.

On a side note, I read 
How Linux Works: What Every Superuser Should Know . It might seem strange that I am recommending reading another book while trying to finish the 700 pages of Hacking Unleashed 7, but for me it made sense to really make sure that I got my Operating System basics covered before moving on to webserver and database hacking. (If you don’t understand what cmd.exe and /bin/bash do, then how are you going to understand why you would want to run those on your target).

Happy hunting!
One person found this helpful
Report
Amazon Customer
5.0 out of 5 stars Hacking 7 Exposed
Reviewed in Canada on November 12, 2012
The authors certainly know what they are talking about. This book shows the reader various ways that a system can be hacked. If this is your intended career direction it is an excellent place to start. The book is well written and covers an enormous amount of material on techniques solutions and various operating systems. The book supplies you with references on the command line and a multitude of software that is available to run against your own system(s). Enjoy.
MikeC
1.0 out of 5 stars Condizioni non buone
Reviewed in Italy on February 26, 2022
Libro arrivato con copertina piena di pieghe. Ai bordi del libro le pagine presentano macchie e qualche pagina all'interno è piegata o macchiata. Conservato piuttosto male.