Great overview of cybersecurity
The book goes into enough detail a beginner can understand without getting heavy in the details. While the tips offered can offered can be found easily on the internet, it was nice to have everything consolidated into a book. I’m keeping this book as a general reference with great explanations provided by the author.
Good and clear introduction, but little shallow
The book has good coverage in terms of breadth, and it explains things in a clear way.Having said that, the coverage is a little shallow (i.e., it is not a book to train a reader as an expert). That itself is not a problem, but I wish the book had provided “further reading/advanced topic” subsection at the end in each section.
Great intro!
I thoroughly enjoyed this quick introduction. I was pleasantly surprised by how much I knew already, but seeing it all tied together was very useful. This is the first of many books I plan to read on cybersecurity. I donât think I could have picked a better introduction!Great intro!
Great book to go over theoryâs
Great book to go over theoryâs of different types of hacks if you didnât know anything. But bad for examples and in depth analysis. Not really hands on
Very useful book, still working thru the text. Kindle format is not my preferred option.Hopefully the paper version will appear soonAn Advanced Cybersecurity book would be an interesting follow onStill working thru this book. I find the section giving readers opportunities to use their computer v useful, especially for e- Mail headers. The work seems a bit short on browsers, clone sites, âusefulâ downloads that contain more than expected, certificates, https lock and certs. Also some notes on other issues users may face -RDP. This book worth the price – helped me a lot to be more informed and aware of the threats users face.
Good for beginners
Like the title says, itâs good for beginners. Also recommend for those that like to be continuous life long learners.
Good book
It is a good book
This is a good book for beginners
This book was easy to read and understand.
Great overview of cybersecurity
The book goes into enough detail a beginner can understand without getting heavy in the details. While the tips offered can offered can be found easily on the internet, it was nice to have everything consolidated into a book. I’m keeping this book as a general reference with great explanations provided by the author.
Very resourcefull book
Great book and it will help you to understand the basics even to eventually study fot Security+.
Good and clear introduction, but little shallow
The book has good coverage in terms of breadth, and it explains things in a clear way.Having said that, the coverage is a little shallow (i.e., it is not a book to train a reader as an expert). That itself is not a problem, but I wish the book had provided “further reading/advanced topic” subsection at the end in each section.
Great intro!
I thoroughly enjoyed this quick introduction. I was pleasantly surprised by how much I knew already, but seeing it all tied together was very useful. This is the first of many books I plan to read on cybersecurity. I donât think I could have picked a better introduction!Great intro!
Great book to go over theoryâs
Great book to go over theoryâs of different types of hacks if you didnât know anything. But bad for examples and in depth analysis. Not really hands on
It was obviously used. There was an 8 dollar coffee shop receipt dated on the 18th of December, 2023 in the book.
Enjoyable book. Explained well. The author seems to have a thing for sparkling kittens. Only recommendable.
Il libro e ben scritto Inoltre fornisce informazioni molto valide per chi è interessato all’argomento e abbisogna di informazioni di base
Very useful book, still working thru the text. Kindle format is not my preferred option.Hopefully the paper version will appear soonAn Advanced Cybersecurity book would be an interesting follow onStill working thru this book. I find the section giving readers opportunities to use their computer v useful, especially for e- Mail headers. The work seems a bit short on browsers, clone sites, âusefulâ downloads that contain more than expected, certificates, https lock and certs. Also some notes on other issues users may face -RDP. This book worth the price – helped me a lot to be more informed and aware of the threats users face.