Media praise for Security Power Tools

Have a blog? Join our Reader Review Program

"Here in a single volume is a veritable think-tank of state-of-the-art security techniques addressing the needs of the most popular computer platforms: Linux, Mac, Unix, and Windows. It is a real eye-opener to the vulnerabilities of computer networks and is therefore a must-have book for network administrators...Written by members of the Juniper Networks' Security Engineering team, with some guest authors, the twenty-three chapters cover the use of both offensive and defensive commercial and freeware tools, along with insider techniques, tips, and methods. The authors reveal the inner workings of a world that is foreign to most computer users, and show the ingenious ways which the "bad guys" have devised to compromise a target's personal data. (Reprinted with permission from The Kleper Report on Digital Publishing, copyright 2007, Graphic Dimensions, Lauderdale by the Sea, FL.)"
-- Michael Kleper, The Kleper Report on Digital Publishing

"I'd love to use this book in my system administrator training courses – it's a beautiful example of how to do problem analysis and counter-intelligence. I guess having the book describe these techniques in detail for the hostiles may be the price I have to pay to get the awareness and (hopefully) the motivation for the admin community to close the holes and do responsible system management."
-- David Boyes, Computers and Publishing, Inc

"Security Power Tools is chock-full of relevant content that is also accessible and straightforward...Security Power Tools is almost guaranteed to offer any intermediate- and advanced-level professional information and tools to fill in knowledge and memory gaps."
-- Bruce Gain, Processor: Products, News & Information Data Centers Can Trust

"Brian Burn's Security Power Tools is a top pick for collections catering to network administrators and programmers concerned with security issues."
-- James Cox, The Bookwatch: The Computer Shelf

"I am a big fan of Security Power Tools because it has a great concept, it is easy to use as a reference in specific situations, and the quality of the content is top notch. "
-- Mirko Zorz, Help Net Security

"Not only is this book the best all-in-one compilation of all the important security tools, it show you how to use them. No, I mean really use them...The book might touch on pretty much everything from rootkits to firewalls, but the authors acknowledge many other specialized books that pick up where this one leaves off. This is just another example of the classiness that is the hallmark of O'Reilly. In that vein, grammatical errors, typos, and cut-and-paste hacks were all absent, as usual. There might have been twelve self-acknowledged "nonwriters" authoring the chapters, but each topic reads cleanly and professionally...The book is accessible to the novice but tailored for the tech-savvy. Simply put, I would recommend this book to anyone who needs a great all-around reference and is concerned with getting stuff done. There are plenty of networking topics for the system admins and vice versa. Since the writers and editors did such a great job writing for a highly technical—but not necessarily security-minded—audience, anyone with a good technical background should snap this book up as soon as possible. "
-- Sam Stover, Usenix ;login:

"This book is written for experienced security professionals who need an authoritative resource for finding the best IT security tool for the job. At nearly 800 pages, the text covers nearly every available security tool known, making it the de facto reference to such tool selection. Readers will find it an invaluable guide."
-- Ben Rothke, CPP, Security Management

"Clearly destined to become a classic work, this is one of those books that is a must-buy, period. "
-- Andy Hudson, Linux Format

"The huge range of security tools covered along with how to use them should be of great use to anyone looking to improve their system security."
-- Stephen Chapman, Ask Felgall



"Here in a single volume is a veritable think-tank of state-of-the-art security techniques addressing the needs of the most popular computer platforms: Linux, Mac, Unix, and Windows. It is a real eye-opener to the vulnerabilities of computer networks and is therefore a must-have book for network administrators."
--Michael Kleper, The Kleper Report on Digital Publishing