Hacking Exposed Series
Book written by McGraw-Hill Education
Book review by Steve Winterfeld
There are not a lot of technical books that meet the definition of “timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete,” but the Hacking Exposedseries does. It started in 1999, has sold almost 1 million copies, and has been translated into almost 30 languages.
The Hacking Exposed series belongs in the Cybersecurity Canon under the technical category as well as history. It is hard to protect your network without understanding the tools and methodologies the hackers, cyber criminals and advanced persistent threats use. This series allows security professionals to quickly educate themselves or look up answers to questions about incidents.
It had to have been a dark and stormy night when Stuart McClure sat down to write Hacking Exposed. The book is designed to give the novice practitioner the framework to build the basic skills needed to become a cybersecurity professional as well as provide reference on specific techniques for the experienced professional. The basic book is broken into four parts – 1) Casing the establishment, 2) Endpoint and server hacking, 3) Infrastructure hacking, and 4) Application and data hacking.
There are several books in the series (most having updated versions) to meet just about every functional or infrastructure need:
- Hacking Exposed 7: Network Security Secrets & Solutions by Stuart McClure
- Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions by Joshua Wright and Johnny Cache
- Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Clint Bodungen and Bryan Singer
- Hacking Exposed Mobile: Security Secrets & Solutions by Neil Bergman and Mike Stanfield
- Hacking Exposed Web Applications by Joel Scambray and Vincent Liu
- Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions by Mark Collier and David Endler
- Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions by Chris Davis and Aaron Philipp
- Hacking Exposed: Malware & Rootkits Secrets & Solutions by Michael A. Davis and Sean M. Bodmer
- Hacking Exposed Windows: Microsoft Windows Security Secrets & Solutions by Joel Scambray
- Hacking Exposed Linux: Linux Security Secrets and Solutions by ISECOM
- Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Dwivedi, Himanshu; Lackey, Zane; Cannings, Rich
It is vital for cybersecurity professionals to understand how the threat works and what tools and techniques they use. These books are very hands on with sample code, visuals depicting how to use tools, plus features like threat vector maps and a countermeasures cookbook. They are designed to provide practical how-to advice on what to do. They show how to use many of the same tools the threat uses to protect your systems.
Bottom line: This series is mandatory reading if you want to understand what is happening at a technical level.