Full description not available
K**K
Pretty good stuff, a little sloppy with the exercises' typos
The Network Security Test Lab by Michael Gregg was a pretty good read. I found the writer’s style to be very easy to follow and he explained things in a way that was reasonable to understand for a non-expert. When I read the first 2 chapters, I was really anticipating the rest of the book being more about the minutiae of an actual “test lab” and the nuances of trying to maintain one. That was not the actual aim of the book, which was more of a general overview of cybersecurity, with some discussion of setting up a lab. I have read the other material of malware, IDS and IPS, and pen tools in other textbooks, and am not complaining of Mr. Gregg’s writing. It was done well. It is only that I was hoping for more of a hard-core physical lab detail and problems/solutions inherent. I will say that there were some typos/errors found in some of the problems and exercises that could have been corrected via editing. That was a disappointment. And, some of the links were not up to date. (That may not be anyone’s fault necessarily, but tough to have happen when using for a class.) I would like the author to have a webpage with up to date links!
D**S
Technical errors, not very clear
In the introduction on page xxiv, the author states " . . . please let me know how it helps you advance in the field of cyber security". On page 40, he gives information regarding his company. Went to their website several days ago, they had a contact page, so I sent them information regarding technical errors or typos and asked a couple of questions. So far, not a reply - not that I really expected THE author to see my input. Still, he should not have made that statement. I have other books and when I contacted the authors or their companies, I received personal replies.Now about the technical errors . . . and so far I am only up to chapter 4 . . .On page 111, he states that the TTL for a Linux is 64. On page 130, he says it is 65. Probably a typo . . .The other error I found appears to be MY mistake. He references Figure 3-26 on page 110. I could not find that figure but when writing this review, I did find it - just that the "Figure 3-26" is inside the figure instead of below it, no big deal.Anyhow, my disappointment so far is no real way to get assistance with the material presented. On page 67, he suggests using a Perl script. Well, that is fine if you know how to use a Perl script . . . . which I have no idea . . .I will keep reading the book and maybe his company will take the time to answer my questions. Like is nslookup considered "scanning" and can it cause me 'problems' if I use it to scan networks.DavidMobile, AL
J**N
Excellent resource!
This book is a great resource for better understanding the technical details of network security. The labs at the end of each chapter separate this book from many others that just present the concepts. I just passed the Security+ exam and this has been a great next step.
A**H
Four Stars
Informative and hits a lot of topics
A**R
I found this book a great asset as a supplement to the hands-on labs
As a student in an ethical hacking class, I found this book a great asset as a supplement to the hands-on labs. It's clear, concise, and easy to understand how to setup, and use a test lab.
N**Z
Four Stars
haven't finished.
C**N
Good book
Good book and very interesting. Should be able to set up lab by following book, but software could be expensive. Some "free" stuff is no longer free.
J**A
It's a great investment book people who can afford to start up ...
It's a great investment book people who can afford to start up network practice labs. Definitely need room and money.
S**S
Ideal book for first time lab builders and beyond.
Great book that takes you right from Noob level right through to building and exploiting your own lab.
S**H
Five Stars
Great book it reached very fast the book is also very nice for learning practical aspects of network security.
J**S
as advertised
as advertised
Trustpilot
3 days ago
4 days ago