This analysis is outdated. Please reanalyze.

Highlights
The algorithms used to provide these results are constantly improving. These results might change.

Quality


I disable many of them myself with the interface templates that i've built.

Neutral Review

This book helps you getting familiar with the flaws in switches which can be misused by hackers.

Neutral Review
Overview
  • How are reviewers describing this item?
    most, good, each and available.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 14 reviews as of our last analysis date on Mar 21 2021.
Details

BETA

The algorithms used to provide these results are constantly improving. These results might change.

Most positive reviewquestion

This book helps you getting familiar with the flaws in switches which can be misused by hackers.It also deals with mitigating a...  Read More


Helpful Insights

BETA

The algorithms used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Discussing the fundamental differences between data plane attacks and control plane attacks.


    Posted by a reviewer on Amazon

    For each topic, the authors discuss various alternatives of mitigation, sometimes to the point where it seems rather obvious (disable this functionality when you do not need it, do not expose trunk protocols towards end stations).


    Posted by a reviewer on Amazon

    I feel especialy the later chapters could have benefitted from the scruntity of a professional editor, as the text sometimes drifts away into vagueness.


    Posted by a reviewer on Amazon

    What got me most excited about lan switch security is that, as far as i know, no previous book was ever dedicatedly devoted to breaking layer 2.


    Posted by a reviewer on Amazon

    The threats that this book explains could be costly to an organization that is blind to them.


    Posted by a reviewer on Amazon

    You will never think of a switch as a mindless toaster or an appliance that is not significant from a security perspective.


    Posted by a reviewer on Amazon

    It is such a high level overview that it really does not help.


    Posted by a reviewer on Amazon

    Chapter 5 shows a detailed dhcp snoop.

Review Count History
Loading...
Price History
Loading...