Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Building DMZs for Enterprise Networks |
List Price: $59.95
Your Price: $39.57 |
 |
|
|
Product Info |
Reviews |
<< 1 >>
Rating:  Summary: loaded w/ good info! Review: Building DMZ's is loaded w/ a lot of good info.
You can really create a great hardened network with the data in the book.
Rating:  Summary: A book on DMZs - it's about time!! Review: I couldn't believe someone had finally taken the time to write about something so crucial in many networks today. With the advent of the dot-com bubble in the mid-90's, networks of various flavors sprung like weed all over the world; many of these were designed with the utmost intent for efficiency and security, unseen previously in many corporate enterprise networks. Taking from those years of innovation, this book details perimeter designs and implementations like I've never seen before! Bastion hosts and wireless DMZs even - a must have reference for the seasoned network administrator/architect!
Rating:  Summary: Lots of useful information, but poorly edited. Review: The author writes on the level of a 6th grader. Here's an example sentance, "Although Windows 2000 is a secure OS, it is only as secure as you can make it". Which literally means "It is already as secure as you can make it". Anyhow, you probably don't know what I'm talking about. But almost every paragraph has a mistake like this in it. Sometimes it's anoying, and sometimes its confusing. There's pretty good info in this book, I just wish it was layed out more logically. Just like with the grammar, the author seems to skip around a lot and doesn't clarify things enough. I think there's a lot of good information, and I've learned alot, but it could be much much better.
Rating:  Summary: Lots of useful information, but poorly edited. Review: The author writes on the level of a 6th grader. Here's an example sentance, "Although Windows 2000 is a secure OS, it is only as secure as you can make it". Which literally means "It is already as secure as you can make it". Anyhow, you probably don't know what I'm talking about. But almost every paragraph has a mistake like this in it. Sometimes it's anoying, and sometimes its confusing. There's pretty good info in this book, I just wish it was layed out more logically. Just like with the grammar, the author seems to skip around a lot and doesn't clarify things enough. I think there's a lot of good information, and I've learned alot, but it could be much much better.
Rating:  Summary: Hella Awesome Review: This book is great. I have been looking for a book like this for so long. Hasnt anyone figured out that there is a need for this!!! All I can say is thank you to the authors (CCIE's, Industry professionals, etc) for doing this book. Step by step and my PIX had a DMZ. My boss flipped. Get this - look great, nuff said.
Rating:  Summary: Never Before Seen Review: Wow. This is all I can say from reading this book. I cant beleive the level of information in this book. As a Network Analyst, I found that this book clearly, painlessly and in a very detailed manner helped me deploy a DMZ on my network. Athough my network is not that huge, this book really helped. This is a great book that made me look good at work when I deployed a PIX with IIS and had to secure it on a DMZ. This book goes WAY deep into VLANs, BGP, Check Point, Windows 2000, Unix, and the list goes on. This book even has two chapters on setting up WLAN DMZs which I never even heard of. Wow.
<< 1 >>
|
|
|
|