Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Network Security First-Step

Network Security First-Step

List Price: $29.95
Your Price: $20.37
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Great Book on Network Security!!!
Review: Cisco has done it again by creating and easy to read and enjoyable book on introducing the world of Network Security. Network Security first-step is by far the best introduction for those who want to know more about the ever growing field of network security. This book is clear, concise, and easily readable. The first chapter takes you through and answers the question "What is a network?" and by the end of the book you have an understanding on what to look out for those intending to do harm to your network via the Internet and such.

Network Security first-step is by far one of the most easily read and understandable books that I have enjoyed on this incredible field. Most books out there tend to get into too much technical jibber-jabber and lose the focus of the reader, but this book keeps your attention and gives very "down to earth" explanations and scenarios. You really get a feel for what the world of security involves and quickly come to realize that this is a growing market in which the opportunities are endless.

The illustrations in the book are extremely helpful while teaching each valuable lesson. This prepares the reader on what to expect if the decide to continue their education with Cisco while pursuing one of their many certification paths.

One of the greatest aspects of this book is the way in which it is written. The author talks to you in a very upbeat, down to earth, and conversational way making you feel as if you are right there with him. There is a kind of mentorship occurring by which he uses everyday examples that you can relate to and incorporates them into learning about the subject at hand.

The chapter summaries in Network Security first-step are right on target. The author stresses the most fundamental and vital points again to make sure the reader is completely ready to move on and build upon what each chapter has to offer without confusing them along the way. This book is again by far the best I have read concerning this topic of Network Security! This series is incredibly valuable to those just starting out or are just curious and want to know more about this specific area of technology. Cisco has proved again to be the leader in the world of Networking!

If you are thinking about getting into the evolving world of Network Security, Network Security first-step is definitely the only book you will need to start your journey of understanding and learning from the world leader of networking, Cisco Systems. Cisco and Tom M. Thomas have created a masterpiece!




Rating: 5 stars
Summary: Security Newbies First Step
Review: Great book for security newbies. Also a great resource for those with more experience in network security. Well written and easy to read. The technologies and terminology used, were explained so that even the beginner could follow along. Nicely done Mr. Thomas.

Rating: 5 stars
Summary: Network Security First Step.
Review: I just recently stumbled upon Cisco Press' "first-step" series of books, and so far I've been very impressed. Networking is one of the computing fields that have very a steep learning curve, and the first-step series goes a long way towards reducing this curve.

Just like the previous "first-step" books I've owned, Tom Thomas' Network Security first-step is going to be a frequent loaner to my coworkers that need a quick refresher on a specific topic.

The sheer amount of material covered in Network Security first-step amazes me. This wide amount of material gives one a good overview of the network security landscape as it stands today. The obvious downside to this is that with the amount of material covered in 393 pages, nothing can be covered in depth.

This isn't necessarily a downside, since this book is just supposed to be an introductory text and not a new version of Managing Cisco Network Security. With that in mind, I would highly recommend this book to those wanting an overview.

Network Security first-step is very logically laid out. The book starts with a general overview of network security, and then launches into what I consider the most important part of an IT department's infrastructure; the security policy. While an in depth study of security policies is out of the scope for a "first-step" book, Network Security first-step does a very good job of impressing the importance of a policy and gives plenty of websites where one can find more information.

There are liberal references to websites for more information if one wants to learn more, and if nothing else this is where Network Security first-step excels. I was extremely surprised to find the sheer amount of links available.

Tom Thomas also uses many common network tools that are available today. I have never seen ettercap so much as mentioned in another security book, let alone used. Network Security first-step does briefly use the tool, but doesn't go into the full power available.

The danger in this book comes from the fact that it does use many security tools. A mischievous person could use many of these tools to create havoc, as much of the information needed to use them is given in the book. However this risk does come with the territory of a network security book.

Overall I'm incredibly impressed with Network Security first-step, and it will become one of my frequent loaners to coworkers. The first-step title does make it seem a little less serious than some of the other Cisco Press titles, but I would put it on my bookshelf with all the others.


Rating: 5 stars
Summary: Security Springboard
Review: I recently read Network Security First-Step (ISBN 1-58720-099-6) as the literal first step in my self-education on network security. I've done a little work with firewalls and ACLs, but due to some major security projects on the horizon, and also on my selfish desire to beef up my resume in that area, I've decided to dedicate some time to furthering my knowledge of network security. The book was written by Tom Thomas, who has authored or co-authored 17 books on networking and has also worked as an instructor. He also has a high level of experience in the industry. This experience shows in the quality of this book, which is advertised as an easy introduction into the world of network security. As such, it seemed like a natural place to start my security studies. Having read the book now, I'd have to say that it definitely lives up to the advertising. It is an introduction for the security novice, with just enough technical material to whet the appetite of even experienced networking guy like myself. When the material does get technical, the author uses real-world examples to explain the concepts and does so to great effect, making the book understandable for network novices.

The book itself is 400 pages and consists of 10 chapters which cover a wide variety of topics. Chapter 1 is an introduction into the mind and tools of hackerdom. Chapter 2 covers basic security policies and practices. Chapter 3 is a basic overview of security technologies and their uses and benefits. Chapters 4 through 9 go more in-depth into the various security technologies introduced earlier (protocols, firewalls, router security, VPNs, wireless, and intrusion detection) and how they are used. Chapter 10 discusses tools for hacking and security auditing. I can't say enough about how valuable I found the information provided in this book. The author sprinkles the book with URLs which not only reinforce the topic he's covering, but also allow the reader to continue researching on their own. I now have a folder full of web bookmarks which I'm only beginning to delve into. This book doesn't just spoon feeding information to the reader, but also sets them up for a much deeper understanding on networking, depending upon their desire to go deeper. Another feature I like about the book is how the author laid out the advantages and limitations of each network security technology. He also doesn't try to sell any one technology as the Panacea for network security. Rather, he advocates a much more practical layered approach to network security.

In conclusion, I recommend this book for anyone wanting to get started in network security. It stands as a springboard into a whole new area of study for my career. I've already come up with a few projects that must be implemented in our network just from reading this introductory book. In the coming months, I plan to read as many security and hacking titles as I can and use that information to better secure our network. I can tell it's going to be a busy year.

On my 5 ping rating scale, I give this book an emphatic 5.
!!!!!


Rating: 5 stars
Summary: Great First Step
Review: I reveled in the fact that a book has been written for those who are new to the security field. This book just be required reading for all Junior Engineers. The author does not over simplify, but does not muddy the waters for those that grasping for a clue. Kudos and Huzzah to Mr. Thomas!!!

Rating: 5 stars
Summary: About Time
Review: It is about time someone wrote a comprehensive book on network security starting from the ground up. This is well written, helpful and insightful. Mr. Thomas has done a superb job!!! I highly recommend this work for any IT professional specializing in security. Awesome Sourcebook!!!

Rating: 5 stars
Summary: Delivers what it promises and infact more!!
Review: Network Security First Step is a welcome addition to Cisco Press First Step series. I read this book in 2 days as I couldn't put it down. I am working in Network Security arena for over 3 years but still learnt lot from this book. Network Security is a huge and ever expanding area of networking but author was able to summarize it in 400 pages (bravo). Obviously you cannot expect detailed treatment of different security technologies but enough was covered to get one going. Infact in certain areas like wireless security,honeypots and vulnerability scanning, author covered more than I expected from a beginner level book.

Though I liked the entire book but my favourite chapters are chapter 1 (Here There are Hackers), Chapter 8 (Wireless Security), Chapter 9 (Honeypots) and Chapter 10 (Tools of the trade). Starting with chapter 1, author set the tone by describing process of an attack.All crucial and free available tools in hacker's arsenal are shown in action. He also explained why network security is needed? He answered why anyone can be a victim though he don't have anything "valuable". Social Engineering also got some coverage as human stupidity is infinite and all technical security controls are useless without humans adhering to security policy.

Router Security, Firewalls, IPSec VPN, AAA, IDS, IPS all got adequate coverage. Wireless security got great attention and topics like wardriving and warchalking are also covered. IPS/IDS are covered along with their types and limitations. Author also described different kind of DOS attacks and their mitigation techniques. Overall I'll recommend it as a must have for any aspiring security professional and a good reference for veterans. I'll recommend Ed Skoudis Counter Hack once you are done reading this book.

Shahid Shafi
CCIE#12665, CISSP#42091




Rating: 1 stars
Summary: Good First-Step for MUCH NEEDED Network Security
Review: Network Security First-Step
(Your first step into the world of network security)
Reviewer Name: Steve Owen Scheiderer, Network Administrator
Reviewer Certification: MCSE NT 4.0, CCNA

ISBN: 1-58720-099-6

If you've ever been victimized by a hacker you're left standing there asking "How'd they do this?" and "What could we have done to prevent it?" One of the most valuable insights of Network Security First-Step by Tom Thomas is that you don't have to be a rocket scientist to begin fighting hacker attacks. Thomas introduces the reader to the techniques - often strikingly simplistic or scripted via readily available tools - of the hacker with a "It takes one to fight one!" tactic.

Although there is plethora of technical information, there is plenty of non-technical information to consider. There is something for network administrators, security experts, CEOs and average Jane and Joe user at the office (or at home). Even the most non-technical user learns the importance of and the role they play in protecting the network with a "loose lips sink ships" approach. CEOs and policy-makers learn to lead by example as they submit to best practices and written policies. This may be one of the greatest feature of the book for the more technically savvy network professional who absolutely needs to enlist the cooperation of both CEO and the average user if the network security war is to be won.

Thomas builds on years of experience to show how hackers not only are interested in "targets of choice" but also "targets of opportunity". The goal is to protect the network on various levels to guard against either type of attack from the extremely sophisticated to those inflicted on sitting ducks ("targets of opportunity"). An entire chapter (Two) is dedicated to written security polices and each chapter is full of tools to use in this quest.

Thomas' expertise simultaneously shines (especially in the "Secure IOS Template" pp. 216-228) and presents a challenge to the novice in the area of network security. At times terminology is presented prior to its definition (like "social engineering" on page 4 and definition on page 5; "choke point" on page 192 and definition on page 193). Patience will be a virtue for the reader when coming upon new terminology throughout the book. So many tools are presented that at times the reader can be left wondering "what does this tool do?" The "Acceptable Use Policy" of Granite Systems is offered "if you want to reuse this policy" (p. 54) but the reader was never told where the text (template) could be downloaded. Finally, at times chapter outlines, figures and flow of the text were hard to follow. Nevertheless, Thomas' expertise and insight make these minor challenges worth enduring and certainly this is a complex topic which a book such as this can only begin to explore.

I would definitely read other titles by this author and his team of technical editors. I give Network Security First-Step a 4.5 rating on a scale of 1 to 5. An on-line errata page would greatly assist the reader in filling in some of gaps, typos, etc. missed by the author and editors.


Rating: 4 stars
Summary: A good "First-Step." Some networking knowledge required.
Review: Network Security First-Step
Reviewer Certifications: CCNA, MCSE, Network+

ISBN: 1587200996

You don't need to work in the Information Technology field to know that Network Security has become a concern and area of focus for many businesses and governments. The media is constantly reporting on the various computer viruses, denial-of-service attacks, digital information theft, or latest vulnerabilities. There seems to be an endless number of people that either 1) like to cause grief for others or, 2) have just a little too much time on their hands. Whatever the case may be, these bad, bad people are creating opportunities for those of us interested in this dynamic and exciting field.

As the title suggests, this book is a good "first-step" toward building at least an awareness of Network Security. Looking for a broad overview of different technologies, concepts, best practices, etc. to start out with, I chose this book. I will mention at this point that before reading this book or doing any studying, I attempted CompTIA's Security+ exam. Let me just say that if you've been working as a Network/SysAdmin for a few years and happen to know what port 443 is used for, you probably won't pass it either. This book has filled in some of the holes (OK, gaping crevices) where I was lacking. It definitely covered many, if not all, of the topics I recall from the exam. The author, Tom Thomas, succeeded in covering a lot of information in an easy to read format along with many references for more in-depth study. I actually bookmarked all the websites mentioned so that I can use them for later reference.

I liked the layout of the chapters - starting first with an overview, covering more specific topics, and then discussing the tools that hackers already use and network administrators should use. My recommendation: have a basic understanding of networking and the importance of securing electronic information resources before picking up this book. If you don't have that, you may want to pick up another CiscoPress title (which I have not read): Computer Networking First-Step. While the book intends to be an introduction to security, if you will, it actually went into more detail than I expected; chapter 6, Router Security, is a good example. Here you'll find an entire Cisco IOS template spanning 13 pages with comments on many of the commands and why they should or should not be used. If you've never worked with the Cisco IOS before, this chapter will probably lose you. If you like to write policies and procedures, Chapter 2 provides many examples of different security policies and how you might word them to fit your organization. Another chapter that I liked was Chapter 8 on Wireless Security. It certainly opened my eyes to my own deficiencies in this area (please, don't come "sniffing" for my access point - at least not yet). Oh, and you can also learn to transform an ordinary Pringles can into a wireless antenna - very interesting if not entertaining!

The book is mostly geared toward general vendor-neutral security concepts, but there is a bit of a bias toward Cisco products. What did you expect, though? It is, after all, the networking market leader and this book was printed by CiscroPress, right? Considering this, I was a little surprised to find so many grammatical errors throughout the book.

All in all I consider this to be a good read for someone new to IT security; a stepping stone to further reading, areas of discipline or security certifications.


Rating: 5 stars
Summary: The journey of a thousand miles begins with a single arp.
Review: The book takes the time to introduce you to hackers and script kiddies. Both are dangerous and still most networks are just as susceptible to both types of aggressors. With the proliferation of wireless network technology, hackers could be attacking other business or computers from your network. How about an employee plugging their computer into an infected client network and then bringing that network virus or trojan back to your corporate network? Or maybe some wiley hacker managed to penetrate your network defenses and now has turned your corporate intranet site to the latest illegal file/music/picture server on the internet.

Sadly most businesses simply throw people, equipment, and money at their networks thinking that they have done their fair share in providing for information security. It is important that the right people, with the right "know-how" are given the right equipment, and the proper authority to bring about true change in an enterprise.

Tom Thomas has provided a short but sweet book to aide in network security for the masses. Network Security First-Step should be the starting point for anyone that wants to learn what it takes to begin the quest for network security. Its not another drivel filled book rehashed product documentation and marketing material. It has fresh, useful and clear information on what a novice or manager can do to start implementing a more secure network. This book is a must have for anyone that owns, manages or directs enterprise network personnel. Even the seasoned network people will find new and useful information contained in this book.

This book covers the who the bad people are, and the steps needed to protect an organization from those very same bad people. It talks about the mean things hackers do to get past well meaning but improperly implemented security mechanisms. Tom addresses what an information security policy should say, and why information security policies are important. He talks about how access lists work, how firewalls work. Explains why statefull packet inspection is better than regular access lists. Authentication Authorization and Accounting are all covered to help you understand what it does, and why AAA I used. He talks about Virtual Private Networks, Intrusion Detection, and my personal favorite, honeypots. Wireless networks, and wireless security are also briefly touched upon in this book.

Network Security First-Step is really one of the best introductions to network security - short of pestering a reclusive IT person that buys Jolt cola by the keg.

Michael Miller
CCIE # 13060



<< 1 2 >>

© 2004, ReviewFocus or its affiliates