How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

This Post Has 12 Comments

  1. Good for beginners
    Like the title says, it’s good for beginners. Also recommend for those that like to be continuous life long learners.

  2. Great overview of cybersecurity
    The book goes into enough detail a beginner can understand without getting heavy in the details. While the tips offered can offered can be found easily on the internet, it was nice to have everything consolidated into a book. I’m keeping this book as a general reference with great explanations provided by the author.

  3. Very resourcefull book
    Great book and it will help you to understand the basics even to eventually study fot Security+.

  4. Good and clear introduction, but little shallow
    The book has good coverage in terms of breadth, and it explains things in a clear way.Having said that, the coverage is a little shallow (i.e., it is not a book to train a reader as an expert). That itself is not a problem, but I wish the book had provided “further reading/advanced topic” subsection at the end in each section.

  5. Great intro!
    I thoroughly enjoyed this quick introduction. I was pleasantly surprised by how much I knew already, but seeing it all tied together was very useful. This is the first of many books I plan to read on cybersecurity. I don’t think I could have picked a better introduction!Great intro!

  6. Great book to go over theory’s
    Great book to go over theory’s of different types of hacks if you didn’t know anything. But bad for examples and in depth analysis. Not really hands on

  7. It was obviously used. There was an 8 dollar coffee shop receipt dated on the 18th of December, 2023 in the book.

  8. Il libro e ben scritto Inoltre fornisce informazioni molto valide per chi è interessato all’argomento e abbisogna di informazioni di base

  9. Very useful book, still working thru the text. Kindle format is not my preferred option.Hopefully the paper version will appear soonAn Advanced Cybersecurity book would be an interesting follow onStill working thru this book. I find the section giving readers opportunities to use their computer v useful, especially for e- Mail headers. The work seems a bit short on browsers, clone sites, ‘useful’ downloads that contain more than expected, certificates, https lock and certs. Also some notes on other issues users may face -RDP. This book worth the price – helped me a lot to be more informed and aware of the threats users face.

Leave a Reply

Your email address will not be published. Required fields are marked *