Description:The book contains a medley of useful tips and tricks, ranging from setting up Snort intrusion detection system to more eclectic usage of Onion routing to hide your true identity. I liked the book, but hoped that it would spend less time explaining how to compile these tools and more time on actually using them.
---
Read my security blogspot at [...]