NEW! Fakespot Chat is live. 

Get answers to your product questions here.

This analysis is outdated. Please reanalyze.

Highlights

The AI used to provide these results are constantly improving. These results might change.

Quality


As i have commented in my own book security deengineering solving the problems in information risk management ...  Read More

Overview

  • How are reviewers describing this item?
    good, still, easy, covered and better.
  • Our engine has profiled the reviewer patterns and has determined that there is minimal deception involved.
  • Our engine has determined that the review content quality is high and informative.
  • Our engine has discovered that over 90% high quality reviews are present.
  • This product had a total of 12 reviews as of our last analysis date on Jun 18 2021.

Helpful InsightsBETA

The AI used to provide these results are constantly improving. These results might change.

    Posted by a reviewer on Amazon

    Some of the more exotic attacks and exploits are not covered but then again the more exotic sides of penetration testing rarely are deployed in anger in a commercial penetration test


    Posted by a reviewer on Amazon

    Probably the author had to decide between waiting more and revamp an important part of the book or publish this edition with no major updates or changes


    Posted by a reviewer on Amazon

    But if you have it wait for a third edition when all major updates in major operating systems take place


    Posted by a reviewer on Amazon

    Warning right off the bat that this is a very niche market of reader and its not not not for the regular developer or admin

Review Count History
Loading...
Price History
Loading...