Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
The Practice of Network Security: Deployment Strategies for Production Environments

The Practice of Network Security: Deployment Strategies for Production Environments

List Price: $49.99
Your Price: $33.99
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: Excellent starting point & introduction to network security
Review: I was pleasantly surprised with ' The Practice of Network Security: Deployment Strategies for Production Environments'. The book is a very good technical overview of the details of network security.

While it is technical in nature, it is not so technical as to turn off the average reader. This is a good resource for a manager that needs to understand a security technology, but who does not want to get bogged down in the technical minutia.

The book brings together all of the top-level security technologies and products needed to secure a corporate infrastructure.

The book covers a lot of ground in its 375 pages and is an excellent starting point for anyone needing a quick and effective introduction to network security.

Rating: 4 stars
Summary: Excellent starting point & introduction to network security
Review: I was pleasantly surprised with ` The Practice of Network Security: Deployment Strategies for Production Environments'. The book is a very good technical overview of the details of network security.

While it is technical in nature, it is not so technical as to turn off the average reader. This is a good resource for a manager that needs to understand a security technology, but who does not want to get bogged down in the technical minutia.

The book brings together all of the top-level security technologies and products needed to secure a corporate infrastructure.

The book covers a lot of ground in its 375 pages and is an excellent starting point for anyone needing a quick and effective introduction to network security.

Rating: 5 stars
Summary: Fantastic Overview of Network Security
Review: I work at a Wireless ISP, and have recently taken over a position that requires me to be familar with how to secure our ISP's wired network. I bought this book as a guide to help me understand all the different devices and software packages that I needed to focus on.

The biggest strength of this book, in my opinion, is the real world networking information and the clear manner in which Liska describes what security risks there are for most network environments and how to make those environments more secure.

For example, a lot of network books talk about RIP (Routing Information Protocol - basically a protocol that allows your router to choose the best path to tramsit data) and most of them recommend enabling it in order to have a redundant network. In my experience, none of the books that I've read, except this one, have mentioned that there are fairly big security risks associated with using RIP. This book describes the nature of the security risks as well as the most likely way someone might exploit them, and then offers suggestions on how to either duplicate RIP's functionality in a more secure way or how to make sure RIP is as secure as it can get.

Another part of the book that was quite helpful to me was the section on VPN's, something I have no experience with. Liska runs through the different types of VPN's, what the effects are of using VPN's, how to make sure your VPN stays secure, and as he does throughout the book, impresses upon you the importance of good passwords.

This is just a small example of two of the many things I learned even on a quick flip through the book. I like this book a great deal because it's crammed full of interesting information that actually applies to my production network that I did not know or even know I had to know. Liska even covers Wireless Networks! As a WISP employee, I can attest to the accuracy of this information, and I would love to see him write more on the subject!

In short, I would recommend this book to anyone looking for an informative and clearly written book covering the most pertinent information on all parts of the network, from Human Beings to Switches to Firewalls. I look forward to Allan Liska's next book.

Rating: 5 stars
Summary: Fantastic Overview of Network Security
Review: I work at a Wireless ISP, and have recently taken over a position that requires me to be familar with how to secure our ISP's wired network. I bought this book as a guide to help me understand all the different devices and software packages that I needed to focus on.

The biggest strength of this book, in my opinion, is the real world networking information and the clear manner in which Liska describes what security risks there are for most network environments and how to make those environments more secure.

For example, a lot of network books talk about RIP (Routing Information Protocol - basically a protocol that allows your router to choose the best path to tramsit data) and most of them recommend enabling it in order to have a redundant network. In my experience, none of the books that I've read, except this one, have mentioned that there are fairly big security risks associated with using RIP. This book describes the nature of the security risks as well as the most likely way someone might exploit them, and then offers suggestions on how to either duplicate RIP's functionality in a more secure way or how to make sure RIP is as secure as it can get.

Another part of the book that was quite helpful to me was the section on VPN's, something I have no experience with. Liska runs through the different types of VPN's, what the effects are of using VPN's, how to make sure your VPN stays secure, and as he does throughout the book, impresses upon you the importance of good passwords.

This is just a small example of two of the many things I learned even on a quick flip through the book. I like this book a great deal because it's crammed full of interesting information that actually applies to my production network that I did not know or even know I had to know. Liska even covers Wireless Networks! As a WISP employee, I can attest to the accuracy of this information, and I would love to see him write more on the subject!

In short, I would recommend this book to anyone looking for an informative and clearly written book covering the most pertinent information on all parts of the network, from Human Beings to Switches to Firewalls. I look forward to Allan Liska's next book.

Rating: 5 stars
Summary: Excellent! A perfect marriage of theory with practice.
Review: I've read many tomes on the subject of security but they never really get into the details of what really matters, they only touch on the very basic ideas, or they are too detailed about one specific topic and fail to present what is in the real world. Finally Mr. Liska has written the text that brings it all together with an excellent marriage of theory and real world practice.

To start, Allan realizes that most network admins are faced with cost-cutting issues and are stuck dealing with management. Allan's dicussions on risk management, cost analysis, and how to "sell" the value of solid network security to the powers that be can be a real eye opener. Make your managers read this stuff. Read it to them yourself.

For the more techincal side, there are very solid in depth discussions on the important stuff like routing, switching, general (and spcific) firewall configuration, comparisons of user authentication approaches, VPN techniques from dial-in access to broadband, an excellent chapter dedicated to Wireless protocols and security, and so much more. Nothing is left out.

This book is a must have for any serious network or system administrator.

Rating: 5 stars
Summary: Excellent Reference
Review: This book is an excellent reference for anyone involved in the practice of network security. It's comprehensive coverage of a wide array of topics will present any network administrator, architect, or engineer with the information and tools necessary to build a secure, stable environment.

In my capacity as a sales engineer for a major hosting provider, I find myself turning to The Practice of Network Security frequently to validate design assumptions. It is written in terms even a beginner can comprehend, yet its information is invaluable to even the most experienced professional.

I highly recommend this book to anyone with an interest, professional or otherwise, in building robust, secure networks.


<< 1 >>

© 2004, ReviewFocus or its affiliates