Ask Fakespot Chat questions about this productAlpha
Add detailed feedback
Message
Loading suggested questions
Suggested Questions
Suggested Questions
No suggested questions were found
Overview
- How are reviewers describing this item?
good, great, technical, most and such. - Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
- Our engine has determined that the review content quality is high and informative.
- Our engine has discovered that over 90% high quality reviews are present.
- This product had a total of 184 reviews as of our last analysis date on Mar 9 2020.
Helpful InsightsBETA
Posted by a reviewer on Amazon
In my opinion this book was primarily written for the c level decision maker who does not fully understand or appreciate the importance of information security
Posted by a reviewer on Amazon
The authors highlights that the most difficult aspect of forensic analysis is attribution
Posted by a reviewer on Amazon
Trying to determine who is responsible for the attack is difficult and sometimes impossible to ascertain
Posted by a reviewer on Amazon
The author of the conficker worm for example which created the largest bot net to this day is still unknown
Posted by a reviewer on Amazon
All the information in the book is from a high level with only a basic amount of technical information
Posted by a reviewer on Amazon
There are several sections that give some detail on particular incidents of hacking such as stuxnet but these too only give enough technical detail to help the reader understand what happened
Posted by a reviewer on Amazon
Also the difficulties of determining just who initiated an attack are explored
Posted by a reviewer on Amazon
Books on cybersecurity and cyberwar are often aggressively hysterical
Review Count History
Price History
Ask Fakespot Chat questions about this productAlpha
Add detailed feedback
Message
Loading suggested questions
Suggested Questions
Suggested Questions
No suggested questions were found