A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more. (IWC Blue Team)
B**A
Easy to follow and effective.
This is a great book. The instructions are very descriptive and intuitive. If you want to get into network defense using tools that are very effective, this is your book.
A**R
Excellent step by step guide
Rich Medlin did an excellent job providing a step by step guide cyber security specialist can utilize to recognize and combat network threats.
N**A
More geared towards security engineers
I bought this book after seeing it on LinkedIn as I had a mutual connection with the author. I expected it to be more of a quick reference guide for detection of more noisy and obvious threats. This is more of a walkthrough on installing and configuring some tools you would expect to find in a SOC and less of what I was expecting. It's good content and it seems to be thorough, but the title was somewhat misleading on what I was expecting.
M**I
Good info bad content management
The information in this book is very helpful to me; however, there are so many missing images that it makes me wonder if anyone did any proofreading before publishing.
R**N
Best I've seen yet! Worth way more than $20!
Great pictures and easy to follow! 100% recommend!
M**M
Printing Issue
A friend of mine has this book and I liked the content, hence why I bought my own copy.Unfortunately, my copy seems to have a printing issue. At the Center of each page, on every even numbered page there is a misprint. In some areas I can’t make out what its supposed to say.
C**R
Bad quality - a lot of pictures are missing or blank
Bad quality control - a lot of pictures are missing or blank
Trustpilot
4 days ago
5 days ago