Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Practical Guide for Implementing Secure Intranets and Extranets (Artech House Telecommunications Library)

Practical Guide for Implementing Secure Intranets and Extranets (Artech House Telecommunications Library)

List Price: $93.00
Your Price: $93.00
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: One of the best implementation guides ever!
Review: I by chance found this book in a library. Although it has been more than two years since this book was published, I still found that this book is one of the best books for teachers to teach students on real-world security implementation practice. The best part of this book is the Case Study section (it almost occupied half of the book). Instead of talking about the steps and concepts in just words (as most of other books do), these Case Studies in this book used diagrams, photo pictures, screen shot and screen captures to make you feel that you are the one in the driver's seat. If one picture is worth thousand words, this book would be equivalent to other books with more than 1,000 pages!

Rating: 2 stars
Summary: Network planning and firewall implementation
Review: The broad scope of this book's title isn't matched by the material inside.

Discussions of policy and planning are reasonable.

Most of the book is a screen-by-screen example showing the setup of Checkpoint's Firewall-1. Some Cisco router information is also provided.

Oddly, no mention is made of wireless LANs; they are perhaps one of the greatest security threats and should be in any book discussing security and networks.

Rating: 2 stars
Summary: Network planning and firewall implementation
Review: The broad scope of this book's title isn't matched by the material inside.

Discussions of policy and planning are reasonable.

Most of the book is a screen-by-screen example showing the setup of Checkpoint's Firewall-1. Some Cisco router information is also provided.

Oddly, no mention is made of wireless LANs; they are perhaps one of the greatest security threats and should be in any book discussing security and networks.


<< 1 >>

© 2004, ReviewFocus or its affiliates