Ask Fakespot Chat questions about this productAlpha
Add detailed feedback
Message
Loading suggested questions
Suggested Questions
Suggested Questions
No suggested questions were found
Highlights
Quality
Great info for dealing with the threats
I have yet to really work through this book but it looks very promising with the sheer amount of information and procedures
I cant think of any other resources with the kind of perspective this book offers
Gave as a gift receiver was very excited
Overview
- How are reviewers describing this item?
great, good, blue, incident and manual. - Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
- Our engine has discovered that over 80% high quality reviews are present.
- This product had a total of 296 reviews as of our last analysis date on Jun 15 2021.
Helpful InsightsBETA
Posted by a reviewer on Amazon
Not completely comprehensive but thats not the purpose of this book
Posted by a reviewer on Amazon
At a minimum please atleast have the basic understanding of security
Posted by a reviewer on Amazon
I hope they can update the content to make it more relevant to current os versions
Posted by a reviewer on Amazon
This manual will grow with you
Posted by a reviewer on Amazon
Deep dive of crucial information for when the worst is happening for your organizations information security
Posted by a reviewer on Amazon
Unfortunately this is not quite the book an aspiring penetration tester would find useful
Posted by a reviewer on Amazon
There seems to be an idea out there that everyone in infosec sits around grepping snort logs andor tcp dumps this simply is not the case
Posted by a reviewer on Amazon
Some oses require you leave the system connected before collecting logs this book does not cover that aspect
Review Count History
Price History
Ask Fakespot Chat questions about this productAlpha
Add detailed feedback
Message
Loading suggested questions
Suggested Questions
Suggested Questions
No suggested questions were found