Rating:  Summary: This book packs a lot of punch Review: After reading the author's long list of covered subject matter, I really expected this to be mostly a theory book. While the book does include theory (I think I finally understand passive and active FTP and how they work), I was really surprised at how much hands on material the book has. For example there is step by step instructions on how to setup and use the included IDS and firewall software. I would say the instructions are even better than the product manuals! This type of step by step instruction continues as the author walks you through creating Cisco access lists, VPNs and even securing different operating systems. This is a great book for someone like me who does not consider themselves to be a "security guru" but still needs to lock down their network.
Rating:  Summary: Perfect for introduction to Network Security Review: Excellent book for people who wish to get a good introductory course to Network Security. I found it a valuable resourse for understaning major fundamental concepts. It is definately NOT oriented for people experienced in security, so the word MASTERING is not suitable. In every other aspect I found Mr Brenton an excellent writer who is impossible not to understant the topics he covers (if you know a bit of networking that is). Good job Mr Brenton...
Rating:  Summary: This one is a sure shot! Review: Finally, a *REAL* book on how to lock down your NT, Unix, and Novell network. I love the O'Reilly books but they are primarily Unix only. This one not only tells you how to hack your system, but tells you where the tools are on the Internet to download and use to cover your a**. I originally bought the book because for less than $40 I could have one CD-ROM with every major Firewall program on it to "try" at home for sys admin stuff. (Checkpoint Firewall-1, Guardian, Real Secure, etc). As it turns out, I haven't even loaded the CD yet because the content in the book is so exciting and to the point. Obviously this author could be a top-notch hacker if he wanted to. I bet he is one of the best Network Securiy Administrators on the planet!
Rating:  Summary: Good intro to network security Review: I agree with a previous reviewer, the word "Mastering" could be substituted by "Introducing". The book gives you a good overview on all aspects related to network security and it assumes only minimal previous knowledge from the reader. There are specific chapters covering Cisco ACL configuration and Firewall-1 setup, OK for the first but I found the FW-1 chapter tedious. All in all a good book for learning the fundamentals but if you are serious about security you'd have to read more.
Rating:  Summary: Good intro to network security Review: I agree with a previous reviewer, the word "Mastering" could be substituted by "Introducing". The book gives you a good overview on all aspects related to network security and it assumes only minimal previous knowledge from the reader. There are specific chapters covering Cisco ACL configuration and Firewall-1 setup, OK for the first but I found the FW-1 chapter tedious. All in all a good book for learning the fundamentals but if you are serious about security you'd have to read more.
Rating:  Summary: Network Security for the Intermediate Admin Review: I am learning to be a Network Security Auditor. I have basic to intermediate knowledge of network administration and security. This book propels you well into the intermediate to advanced knowledge of network security. This book is easy to understand, but a working knowledge of TCP/IP, Firewalls and Network Administration is a must. Combine this book with the Hacking Exposed book and you are set.
Rating:  Summary: good step by step instructions Review: I bought this book because I took Mr. Brenton's SANS LevelOne course on auditing NT online. I found the book to be just as useful as the on-line course. There is little fluff and everything is laid out in a clear an precise manner. If you need help implementing security precautions on your network this is the book to buy.
Rating:  Summary: Awesome Book Review: I imagine Chris didn't choose the exact title of this book, as it is another of Sybex's "Mastering..." series. He would probably agree that no single book or combination of books will produce a security "expert." Regardless, I was surprised at the scope of material and Chris' ability to explain it well. I am trying to broaden my security horizons beyond intrusion detection, and I found this book well organized, logical, and amazingly pertinent almost two years since it was written. I found what I believe are very minor errors (e.g., details of a FIN scan), but I can't fault anyone who attempts to capture so much information in one volume. I will recommend my intrusion detection analysts add this book to their reading lists. Thanks Chris!
Rating:  Summary: "Mastery" not possible, but a strong volume nonetheless Review: I imagine Chris didn't choose the exact title of this book, as it is another of Sybex's "Mastering..." series. He would probably agree that no single book or combination of books will produce a security "expert." Regardless, I was surprised at the scope of material and Chris' ability to explain it well. I am trying to broaden my security horizons beyond intrusion detection, and I found this book well organized, logical, and amazingly pertinent almost two years since it was written. I found what I believe are very minor errors (e.g., details of a FIN scan), but I can't fault anyone who attempts to capture so much information in one volume. I will recommend my intrusion detection analysts add this book to their reading lists. Thanks Chris!
Rating:  Summary: Great for beginners, tedious for the experienced. Review: I'm a SSO, and while experienced, I found this a valuable book. Others with experence may find it tedious, because it deals with the "simple stuff" in great detail as well, and is tedious at times. But the way points are illustrated I have found useful in my rolse of communicating security issues to others. If you're an experienced security oriented sysadmin, on't buy this book, it will irritate you. It only covers the technical aspects in detail, and, as I say, the detail seems predantic at times. This is definitely a book that you need to browse before deciding if it will be of value to you other than a 'read once'.
|