Highlights
Quality
I disable many of them myself with the interface templates that ive built
This book helps you getting familiar with the flaws in switches which can be misused by hackers
Overview
- How are reviewers describing this item?
most, good, each and available. - Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
- Our engine has determined that the review content quality is high and informative.
- Our engine has discovered that over 90% high quality reviews are present.
- This product had a total of 14 reviews as of our last analysis date on Mar 21 2021.
Helpful InsightsBETA
Posted by a reviewer on Amazon
Discussing the fundamental differences between data plane attacks and control plane attacks
Posted by a reviewer on Amazon
For each topic the authors discuss various alternatives of mitigation sometimes to the point where it seems rather obvious disable this functionality when you do not need it do not expose trunk protocols towards end stations
Posted by a reviewer on Amazon
I feel especialy the later chapters could have benefitted from the scruntity of a professional editor as the text sometimes drifts away into vagueness
Posted by a reviewer on Amazon
What got me most excited about lan switch security is that as far as i know no previous book was ever dedicatedly devoted to breaking layer 2
Posted by a reviewer on Amazon
The threats that this book explains could be costly to an organization that is blind to them
Posted by a reviewer on Amazon
You will never think of a switch as a mindless toaster or an appliance that is not significant from a security perspective
Posted by a reviewer on Amazon
It is such a high level overview that it really does not help
Posted by a reviewer on Amazon
Chapter 5 shows a detailed dhcp snoop