DNF. The gist of this book is that it namedrops a metric ton of different tools, spend pages on describing how to install them and two words on that they can be used. No explanation of the tools, what they do, the exploits they use, or what else they can do outside of the extremely narrow focus of the current paragraph.
Granted, the reader is warned about this in the beginning (you are expected to know how to use these tools before you read this book), but this also means that the book renders itself pointless -- if you know how to use all the tools you do not need this book because you probably know more than the author already, and if you don't know the tools the book will not help you.
The book is weirdly formatted (bullet list all the things!), and not proofread.