<< 1 >>
Rating:  Summary: One of the best implementation guides ever! Review: I by chance found this book in a library. Although it has been more than two years since this book was published, I still found that this book is one of the best books for teachers to teach students on real-world security implementation practice. The best part of this book is the Case Study section (it almost occupied half of the book). Instead of talking about the steps and concepts in just words (as most of other books do), these Case Studies in this book used diagrams, photo pictures, screen shot and screen captures to make you feel that you are the one in the driver's seat. If one picture is worth thousand words, this book would be equivalent to other books with more than 1,000 pages!
Rating:  Summary: Network planning and firewall implementation Review: The broad scope of this book's title isn't matched by the material inside. Discussions of policy and planning are reasonable. Most of the book is a screen-by-screen example showing the setup of Checkpoint's Firewall-1. Some Cisco router information is also provided. Oddly, no mention is made of wireless LANs; they are perhaps one of the greatest security threats and should be in any book discussing security and networks.
Rating:  Summary: Network planning and firewall implementation Review: The broad scope of this book's title isn't matched by the material inside. Discussions of policy and planning are reasonable. Most of the book is a screen-by-screen example showing the setup of Checkpoint's Firewall-1. Some Cisco router information is also provided. Oddly, no mention is made of wireless LANs; they are perhaps one of the greatest security threats and should be in any book discussing security and networks.
<< 1 >>
|