EDIT: As of 11/20/2024 - This post has been restored pretty much "as is" for now.
I'll be back with more updates soon.
Click here or on the book cover above to find it on amazon.
The Authors Present An Approach To Studying Consisting of A Combination of Theory and Practice.
This is the exact review I left on Amazon.com. (I’m STILL waiting for Amazon to publish it) I’m sharing it here because this is the foundation of an extended book review project that I intend to build upon over time. I hope you’ll join me on this journey and dive deeper with me to learn more about the mindset, techniques and tools used to perform modern web attacks and exploits.
And without further ado, I proudly present to you, the review…
Virtue stands in the middle of the pages of this book!
In Latin: “In medio stat virtus” (“virtue stands in the middle”)
I appreciate how the authors introduced this approach through practical exercises and examples to explain and illustrate the theories and concepts covered in the book through proven processes, strategies and frameworks.
Furthermore, they threw me into a vulnerability analysis to test for cross-site scripting vulnerability, right in the first chapter! Then the authors taught me the processes of information gathering, threat modeling, vulnerability analysis, exploitation and post-exploitation with hands-on activities that were quite comprehensive.
Finally, the authors promised me I’d leave the book with practical hands-on experience and a better understanding of modern web application security concepts and they delivered!
In Conclusion…
Hopefully you’ll join me on this learning journey and check back in with me later to see the updates.
If you made it this far you’re the real MVP! 🏆
Thank you for reading, I hope you found value in my review. 🎁