NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.

Overview

  • How are reviewers describing this item?
    great, excellent, most and good.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 80% high quality reviews are present.
  • This product had a total of 64 reviews as of our last analysis date on Jul 29 2020.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Configuring java chapter needs to drop oracle jdks and use openjdk


    Posted by a reviewer on Amazon

    Chapter 3 explains public key infrastructure pki as used with ssltls


    Posted by a reviewer on Amazon

    The remaining chapters focus on the ways in which an attacker can exploit various vulnerabilities in internet pki web browsers and other httpbased compromises of confidentiality andor data integrity


    Posted by a reviewer on Amazon

    Kudos to the author for devoting an entire chapter to performance optimization


    Posted by a reviewer on Amazon

    I am a network engineer who recently started learning security implementations side of the network


    Posted by a reviewer on Amazon

    It goes into the matters of how ssl and tls work and how to properly configure it on modern web servers


    Posted by a reviewer on Amazon

    My main complaint is that the publish date is 2017


    Posted by a reviewer on Amazon

    I thought i got an old edition from amazon but i confirmed on the publisher’s site that it’s the latest

Review Count History
Loading...
Price History
Loading...

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.