To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyses reviews to verify trustworthiness.
This book is fine, but very basic. There already exist a number of good books that cover 80% of the content here the same goes for the python section. I guess my expectation was to see a bit more complex bash foo to handle slightly more complex but useful tasks.
But if you really know nothing about Linux this is good book, but the no starch book “how Linux works” is better.
Although I am an Arch Linux user, I expected to find some serious new information about network security etc in this book. I was sadly disappointed. Throughout the book, the information is no more than a regular user of linux would already be familiar with and beginners would find it in a 'Linux for Dummies' type of book, or preferably online and in 'man' files. There were several mistakes as well. the first biggie came when I tried to use snort.conf in the text manipulation chapter. It wasn't installed on my virtual box Kali distro. Odd! It wasn't available in Kali although it most certainly was in Arch. Eventually I realised that the Kali Repos were not activated and I was able to go into the relevant '.resolv' file and correct that. Surely, the author should have caught that one. It was also annoying that whenever the book started to get interesting, the author would stop with his stock phrase of 'but this is beyond the scope of this book'. Annoying! In short, I regret paying the money for this book. I usually like the 'nostarch' books so this was a big disappointment. I don't recommend buying this book. The information in it is readily available on the internet and in other learner books.
I decided to give this book 4 stars just because I like the way it is laid out (speaking frankly colour in the book wouldn't have gone a miss, it is all black and white with a little grey) and also that it is useful if you are just beginning to get into all this stuff. There were parts that when I followed along it worked and some other parts it didn't work but that is because I didn't have all the proper tools/packages installed.
I am wondering why carefulbuyer decided to buy this surely he could read the title of the book?? I read his review and since he was already familiar with all the concepts it made no sense and his weird thing of wanting to find new information didn't make sense given what the title is, I suppose some new concepts could be introduced however since this was clearly aimed at beginners and people with very little knowledge then he just decided to buy the book to bash the author which I think is wrong.
There are parts the author could improve in the next book if they decide to write a new book or a more advanced book in the future. A little bit of testing while also writing the book couldn't have gone a miss either, however if the book doesn't tell you what packages you need and you need to do research on the internet to find out I will just guess that is the author not spoon feeding everything to you, you don't learn by being given everything, you get given a little and you make something from that and what you don't know you find out from research yourself.
I am using my real name because people can use any name for their reviews and I find leaving the real name allows reviewers who read the reviews to say yes this guy must be real or this guy was clearly paid to write a review.
Regardless of whether you read the reviews or not just think carefully whether you want to spend your money on this book as it is your money and only you can make the decision whether to spend it or not. Always do the research first before buying.
Firstly this is an introduction to Linux. If you have already been exposed to Linux you need to pick up something else. Book runs through the basics from setting up a virtual machine to the way Linux is structured to more advanced exploitation techniques using Kali. The book is aimed at those who have an interest in InfoSec or who are already in the sector, the author very much sells it as in order to defense you need to know how to offense. Personally I currently work in the sector but very much from a compliance perspective so ISO 27001, PCI, auditing. This book is ideal for patching the gaps and giving a foundation of Linux skills to build on. Its really well printed and the author relly presents the topic well. The author also has a great companion website with a video series although this is an additional fee. In short would recommend.
Ob das jetzt dem Hackerparagraphen geschuldet ist, das mir das Buch irgendwie sauer aufstößt oder einfach dem Umstand das zwar viele Themengebiete angeschnitten werden aber halt wirklich nichts im Detail erklärt wird. Man findet halt immer nur Verweise, wenn man Sie denn nunmal findet.
Für jemand der sich über die Möglichkeiten informieren will, die einem mit Linux zur Verfügung stehen und der sonst keinen schimmer hat, von dem was er eigentlich mit Linux anfangen oder lernen will bietet dieses Buch dennoch einen guten Einstieg und informiert halt, was man sich noch so alles in den Kopf kloppen muss um sich Hacker zu nennen zu dürfen.
Man nimmt dann auch halt Kali, bei dem die ganzen neat tools ja schon vorinstalliert sind und man nicht erst mit apt search, oder apt-cache search rausfinden muss, wie das Paket heißt um es mit apt install zu installieren und mit apt-file list herauszufinden, was das Paket eigentlich an welcher stelle im Dateisystem abgelegt hat. Tja Leute und wer halt CentOS oder eine andere RedHat basierte Distribution verwendet, kann mit seinem neuen Wissen eh nicht prahlen, weil das ganze nur auf Debian Basis funktioniert und nicht auf Redhat, Arch Linux oder Parabola, die nutzen nämlich jeweils andere Paketmanager.
Wenn ihr richtig was lernen wollt, schnappt euch das Buch von Heike Jurzik zu Debian und zieht dann weiter zu Raphael Hertzog und Roland Mas oder eines der vielen Bücher von Sobell. Auf der Webseite von RedHat finden sich darüber hinaus weit mehr als 22 freie Dokumente dessen Umgang man an dem freien CentOS (Community Enterprise Operating System) erproben kann, welches RedHat Enterprise Linux als Basis verwendet, falls euch yum und RPM mehr liegen als deb Pakete.
Besser als sich mit Hydra an fremder Leute ssh Zugang zu versuchen oder mit Metasploit eine Dummheit zu begehen ist es allemal und vielleicht bringt es euch auch einen Job in der IT.