Hands-On Ethical Hacking and Network Defense
R**A
Material fine but things missing
What i mean is stuff like the answers to the review questions. The books has none of the answers. The appendix A, it is referenced a few times in the first chapter about look at Table A-1 in Appendix A and so on. But when you go, there are no tables other than what is in appendix A already.The fact that you can't check the answers to the review questions is stupid.
P**E
it doesn't meet its cost!
This book is good for a student who is fresh in networking and cyber security. It is because of the easy to understand telling language. However, organization of the subjects in the chapters sometimes irregular. For me, it was difficult to comprehend the connections between concepts. Besides, there are a lot of attributions to internet. I could learn the hacking tools with the support of internet search. The book is not enough. I feel lucky because I can find vast amount of explanation of any computer term on the internet. The characters are small to read, especially the writings in the screenshots of hacking tools are tiny. It is difficult to read for adult learners. I think that there must be other textbooks about ethical hacking that is better than this textbook. It is totally not worth it to pay this amount of money for this book. I bought it because it was a mandatory book at school. Lastly, I wanna add something else. The CD of this textbook didn't run on my computer with Windows 8 pro.
_**_
Good introductory piece.
Just finishing this title, I have a few different thoughts about it. I would have to say it is a good book for beginners, or those looking to expand there current understanding of the topics. There was little practical application found in this book, moreover, I believe that the authors goal was to introduce the technologies at hand, not so much as to how to use them. But, it would be wrong to say they don't explain them self, there are several portions where they laid out nice step-by-step details.So overall, I would have to say that this title is a recommended read for someone interested in hacking, not an all in one, but defiantly a book to include in your "Web" of security books to read.
S**S
Good for beginners
I gave it 4 stars because because the title is miss leading. This books covers a lot of high level concepts and not really anything useful. It is a great intoleo to the topic
E**N
Hands-On Ethical Hacking and Network Defens
The book is great with case scenarios and review questions at the 3nd of each chapter. My problem is that the Kali Live DVD doesn't boot(not bootable on any machine) on several machines that have been tested. IT WILL START INSTALL PROCESS IN VM BUT WILL STALL RIGHT AT INITIAL BOOT PROCESS. NO SCRATCHES NO NICKS😡😡
S**N
Good for beginners
Overall, I think this is a good book for a beginner (I, myself, am a beginner). It made it a little easier for me because I have a computer information systems background and I took a few networking courses, which gave me the necessary foundation for reading this book. If you have no IT background at all, you can probably still get something from the text, but I would recommend gaining an understanding of computer networks or at least having a supplementary networking book handy. Overall, good book.
T**Y
Good
This book was required for the capstone course csci 681. It’s a good read and thanks to the authors. I passed the course.
D**L
Great study guide and reference book.
Used this for a CS Special Topics class. Plan to use it at some point to work toward my CEH certification. As with all certifications this book is just one tool to have in your library. Some of the links in the book were no longer valid but with a quick search of the site you can find a multitude of other resources.
J**A
Four Stars
Good book
R**O
Missing answers for the Review Questions
Good book for a beginner with networking background.It would have been really handy to include the answers for the review questions.
Trustpilot
1 day ago
3 days ago