This analysis is outdated. Please reanalyze.

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.

Overview

  • How are reviewers describing this item?
    good, great, technical, most and such.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 184 reviews as of our last analysis date on Mar 9 2020.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    In my opinion this book was primarily written for the c level decision maker who does not fully understand or appreciate the importance of information security


    Posted by a reviewer on Amazon

    The authors highlights that the most difficult aspect of forensic analysis is attribution


    Posted by a reviewer on Amazon

    Trying to determine who is responsible for the attack is difficult and sometimes impossible to ascertain


    Posted by a reviewer on Amazon

    The author of the conficker worm for example which created the largest bot net to this day is still unknown


    Posted by a reviewer on Amazon

    All the information in the book is from a high level with only a basic amount of technical information


    Posted by a reviewer on Amazon

    There are several sections that give some detail on particular incidents of hacking such as stuxnet but these too only give enough technical detail to help the reader understand what happened


    Posted by a reviewer on Amazon

    Also the difficulties of determining just who initiated an attack are explored


    Posted by a reviewer on Amazon

    Books on cybersecurity and cyberwar are often aggressively hysterical

Review Count History
Loading...
Price History
Loading...

Ask Fakespot Chat questions about this productAlpha

Initializing Fakespot Chat

error

System error,

Loading suggested questions

Suggested Questions

athena-arrow

Suggested Questions

No suggested questions were found

Please note: The content is generated by an AI language model based on reviews. We are constantly improving the accuracy, however, its outputs may contain errors or offensive content from certain reviews. Please report any errors or offensive content to us. Also, please note that we will not collect your questions unless you click the thumbs up/down button to provide feedback. The answers displayed will be stored by us so if another Fakespotter asks a similar question we can provide them an answer faster. Your feedback will only help us make Fakespot Chat better! By using Fakespot Chat, you agree to Fakespot's terms of use and privacy notice.