NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Overview

  • How are reviewers describing this item?
    great, rash, secure, written and better.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 19 reviews as of our last analysis date on Mar 4 2020.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Describe the who how and when of the way in which the main issues related with host security should be mitigated


    Posted by a reviewer on Amazon

    Chapter 4 showed me how to detect attacks like keystroke logging


    Posted by a reviewer on Amazon

    Chapter 5 started the story of the port scan attack detector


    Posted by a reviewer on Amazon

    Chapter 7 showed how psad identifies the cracking operating system


    Posted by a reviewer on Amazon

    Chapter 9 showed me how to set up better iptables firewall rules based on observations from snort


    Posted by a reviewer on Amazon

    Chapter 14 helps provide trends on iptables log data


    Posted by a reviewer on Amazon

    Disclaimer i wrote the foreword for this book so obviously i am biased


    Posted by a reviewer on Amazon

    Ive read or tried to read plenty of books that seemed to offer helpful content but the author had no clue how to deliver that content in a readable manner

Review Count History
Loading...
Price History
Loading...