Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: A "Must Have" for Anyone Serious about Security Review: Douglas Schweitzer follows up with another excellent read and a definite "must have" in any administrator's library, be he a professional or a home user with only one or two desktops to manage. With the propagation of various worms & trojans on the 'net these days, good references are a necessity. "Securing the Network" stands out above the crowd to offer clear, concise information and recommendations to protect valuable & sensitive data. The appendices alone contain a veritable treasure trove of information.
Rating: ![1 stars](http://www.reviewfocus.com/images/stars-1-0.gif) Summary: Errors in the book make me wonder? Review: First, I want to preface this by saying that I have not yet read the book. What makes me wonder about whether I want to read it or not is a glaring error I noticed in an excerpt found on the PC Flank website where the author states:"While it did not carry a damaging payload, it did prove the concept that cross-platform Java viruses could be written. Strange Brew, however, affects only Java applications, not Java applets (the small Java scripts) that typically run inside a Web browser. Because the Java Virtual Machine has built-in security measures, it does not allow Java applets direct access to the hard disk nor the ability to modify applications. This prevented Strange Brew from reaching other Java code and causing harm. In January of 1999, the second known Java virus, called Java.BeanHive, was discovered. This virus was designed to infect both Java applets as well as Java applications. Remember, Java applets are small Java programs (written in Java Script) that are often used on Web sites that are downloaded and run by Web browsers while users surf the Internet." While the author is probably correct about the particular Java viruses he mentioned, he is totally wrong about what Java is. Java != JavaScript. While Java and JS share a similar syntax on the basic language level (along with C++), they are not the same language at all. Java is not a scripting language and it is not JavaScript. They are two completely different languages and APIs. This makes me wonder what other uncaught mistakes are in the book and just how correct the author's facts, and therefore how correct his conclusions are.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Slammer didn't get me... Review: Hey..I followed the procedures outlined in this book and was spared from the Slammer virus. This book works!
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Very Interesting Review: I found this book quite interesting. Unlike other books I'v read, this book explained this subject in an easy to understand and interesting manner. While it can get technical at times, I'd say...give it a shot. It's got some great links to security products that I never knew even existed.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Good, Sound Advice Review: I must say that this book provides good sound advice that is easy to comprehend. Using the techniques outlined in this book, I feel safe and secure against hackers and malcious code threats.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: well organized, well written Review: I read this book scared of all that lurks in cyberspace. And while I'm still scared, I'm no longer in the dark. Very informative read.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Good Read, Sometimes Scary Review: I read this book unsure of what to expect. While is was an interesting read for a technical book, I found it quite scary at times. If you think you are safe from malicious code and hackers, read this book then think again!
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: But this book! Review: I really liked this book. This is a how-to book, beginning with the psycology of virus writers. It covers everything on how to protect your computer and network from malicious code. One of the most interesting computer books I've read!
Rating: ![2 stars](http://www.reviewfocus.com/images/stars-2-0.gif) Summary: Not for advanced users or enterprise administrators Review: Of the 310 pages of text in this book only about 50 pages have information about useful things to do to protect yourself from Viruses. The rest is defining malicious code, basic computer info (what is FAT16 and FAT32), what the FBI is doing about cyberhackers, etc. There is a pretty good chapter on social engineering, but most of the book would only be useful for people new to systems administration and in a small shop. There are only two pages about network firewalls - not much for a book with "network" in the title.
A number of known worms are described but there is no strategy proposed for detecting or stopping them. There is 1 page about responding to events and only 3 pages about securing web servers.
The information in this book is no longer timely or comprehensive.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Comprehensive, Comprehendible, and Required Reading. Review: The book covers the topic of personal security with insight and in a manner that should be comprehendible to almost all readers regardless of their technical background. It is well written, and quite complete in its topic coverage. With today's high-speed network connections, and almost inexhaustible supply of malicious intruders; the book is almost a necessity. Certainly, anyone with a DSL, Dish, Cable router, or even an unfiltered email account should obtain their own copy without hesitation.
|