Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Mastering Network Security

Mastering Network Security

List Price: $49.99
Your Price: $32.99
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: This book packs a lot of punch
Review: After reading the author's long list of covered subject matter, I really expected this to be mostly a theory book. While the book does include theory (I think I finally understand passive and active FTP and how they work), I was really surprised at how much hands on material the book has. For example there is step by step instructions on how to setup and use the included IDS and firewall software. I would say the instructions are even better than the product manuals! This type of step by step instruction continues as the author walks you through creating Cisco access lists, VPNs and even securing different operating systems. This is a great book for someone like me who does not consider themselves to be a "security guru" but still needs to lock down their network.

Rating: 5 stars
Summary: Perfect for introduction to Network Security
Review: Excellent book for people who wish to get a good introductory course to Network Security. I found it a valuable resourse for understaning major fundamental concepts. It is definately NOT oriented for people experienced in security, so the word MASTERING is not suitable. In every other aspect I found Mr Brenton an excellent writer who is impossible not to understant the topics he covers (if you know a bit of networking that is). Good job Mr Brenton...

Rating: 5 stars
Summary: This one is a sure shot!
Review: Finally, a *REAL* book on how to lock down your NT, Unix, and Novell network. I love the O'Reilly books but they are primarily Unix only. This one not only tells you how to hack your system, but tells you where the tools are on the Internet to download and use to cover your a**.

I originally bought the book because for less than $40 I could have one CD-ROM with every major Firewall program on it to "try" at home for sys admin stuff. (Checkpoint Firewall-1, Guardian, Real Secure, etc). As it turns out, I haven't even loaded the CD yet because the content in the book is so exciting and to the point.

Obviously this author could be a top-notch hacker if he wanted to. I bet he is one of the best Network Securiy Administrators on the planet!

Rating: 4 stars
Summary: Good intro to network security
Review: I agree with a previous reviewer, the word "Mastering" could be substituted by "Introducing". The book gives you a good overview on all aspects related to network security and it assumes only minimal previous knowledge from the reader. There are specific chapters covering Cisco ACL configuration and Firewall-1 setup, OK for the first but I found the FW-1 chapter tedious.

All in all a good book for learning the fundamentals but if you are serious about security you'd have to read more.

Rating: 4 stars
Summary: Good intro to network security
Review: I agree with a previous reviewer, the word "Mastering" could be substituted by "Introducing". The book gives you a good overview on all aspects related to network security and it assumes only minimal previous knowledge from the reader. There are specific chapters covering Cisco ACL configuration and Firewall-1 setup, OK for the first but I found the FW-1 chapter tedious.

All in all a good book for learning the fundamentals but if you are serious about security you'd have to read more.

Rating: 5 stars
Summary: Network Security for the Intermediate Admin
Review: I am learning to be a Network Security Auditor. I have basic to intermediate knowledge of network administration and security. This book propels you well into the intermediate to advanced knowledge of network security. This book is easy to understand, but a working knowledge of TCP/IP, Firewalls and Network Administration is a must. Combine this book with the Hacking Exposed book and you are set.

Rating: 5 stars
Summary: good step by step instructions
Review: I bought this book because I took Mr. Brenton's SANS LevelOne course on auditing NT online.

I found the book to be just as useful as the on-line course. There is little fluff and everything is laid out in a clear an precise manner. If you need help implementing security precautions on your network this is the book to buy.

Rating: 5 stars
Summary: Awesome Book
Review: I imagine Chris didn't choose the exact title of this book, as it is another of Sybex's "Mastering..." series. He would probably agree that no single book or combination of books will produce a security "expert." Regardless, I was surprised at the scope of material and Chris' ability to explain it well. I am trying to broaden my security horizons beyond intrusion detection, and I found this book well organized, logical, and amazingly pertinent almost two years since it was written. I found what I believe are very minor errors (e.g., details of a FIN scan), but I can't fault anyone who attempts to capture so much information in one volume. I will recommend my intrusion detection analysts add this book to their reading lists. Thanks Chris!

Rating: 4 stars
Summary: "Mastery" not possible, but a strong volume nonetheless
Review: I imagine Chris didn't choose the exact title of this book, as it is another of Sybex's "Mastering..." series. He would probably agree that no single book or combination of books will produce a security "expert." Regardless, I was surprised at the scope of material and Chris' ability to explain it well. I am trying to broaden my security horizons beyond intrusion detection, and I found this book well organized, logical, and amazingly pertinent almost two years since it was written. I found what I believe are very minor errors (e.g., details of a FIN scan), but I can't fault anyone who attempts to capture so much information in one volume. I will recommend my intrusion detection analysts add this book to their reading lists. Thanks Chris!

Rating: 3 stars
Summary: Great for beginners, tedious for the experienced.
Review: I'm a SSO, and while experienced, I found this a valuable book. Others with experence may find it tedious, because it deals with the "simple stuff" in great detail as well, and is tedious at times. But the way points are illustrated I have found useful in my rolse of communicating security issues to others. If you're an experienced security oriented sysadmin, on't buy this book, it will irritate you. It only covers the technical aspects in detail, and, as I say, the detail seems predantic at times.

This is definitely a book that you need to browse before deciding if it will be of value to you other than a 'read once'.


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates