NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Highlights

The AI used to provide these results are constantly improving. These results might change.

Quality


I disable many of them myself with the interface templates that ive built


This book helps you getting familiar with the flaws in switches which can be misused by hackers

Overview

  • How are reviewers describing this item?
    most, good, each and available.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 14 reviews as of our last analysis date on Mar 21 2021.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Discussing the fundamental differences between data plane attacks and control plane attacks


    Posted by a reviewer on Amazon

    For each topic the authors discuss various alternatives of mitigation sometimes to the point where it seems rather obvious disable this functionality when you do not need it do not expose trunk protocols towards end stations


    Posted by a reviewer on Amazon

    I feel especialy the later chapters could have benefitted from the scruntity of a professional editor as the text sometimes drifts away into vagueness


    Posted by a reviewer on Amazon

    What got me most excited about lan switch security is that as far as i know no previous book was ever dedicatedly devoted to breaking layer 2


    Posted by a reviewer on Amazon

    The threats that this book explains could be costly to an organization that is blind to them


    Posted by a reviewer on Amazon

    You will never think of a switch as a mindless toaster or an appliance that is not significant from a security perspective


    Posted by a reviewer on Amazon

    It is such a high level overview that it really does not help


    Posted by a reviewer on Amazon

    Chapter 5 shows a detailed dhcp snoop

Review Count History
Loading...
Price History
Loading...