Overview
- How are reviewers describing this item?
great, rash, secure, written and better. - Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
- Our engine has determined that the review content quality is high and informative.
- Our engine has discovered that over 90% high quality reviews are present.
- This product had a total of 19 reviews as of our last analysis date on Mar 4 2020.
Helpful InsightsBETA
Posted by a reviewer on Amazon
Describe the who how and when of the way in which the main issues related with host security should be mitigated
Posted by a reviewer on Amazon
Chapter 4 showed me how to detect attacks like keystroke logging
Posted by a reviewer on Amazon
Chapter 5 started the story of the port scan attack detector
Posted by a reviewer on Amazon
Chapter 7 showed how psad identifies the cracking operating system
Posted by a reviewer on Amazon
Chapter 9 showed me how to set up better iptables firewall rules based on observations from snort
Posted by a reviewer on Amazon
Chapter 14 helps provide trends on iptables log data
Posted by a reviewer on Amazon
Disclaimer i wrote the foreword for this book so obviously i am biased
Posted by a reviewer on Amazon
Ive read or tried to read plenty of books that seemed to offer helpful content but the author had no clue how to deliver that content in a readable manner