Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
|
 |
Network Security First-Step |
List Price: $29.95
Your Price: $20.37 |
 |
|
|
|
| Product Info |
Reviews |
Rating:  Summary: Awesome book!!!!! Review: This book is awesome from cover to cover. I rate it 10 stars... I even received a free mouse pad with the book. The first chapter is a must read for anyone involved in the security field. In the first chapter Tom takes you through the steps and mindset of both the serious hacker and the script kiddies. You will learn what tools are used and how they are deployed against various targets. I found this chapter to be one of the best ones I have ever read. Also included in the very first chapter is a list of common exploits, it doesn't get any better then that. After reading the very first chapter I wanted to see if I could hack, I didn't though. Tom understands that in order to win a war, you must know your enemy and he does his best to help the reader.
The book continues with security policy and how to respond to these. This chapter helps with the dreaded task of creation of and administration of good security polices and practices. While this chapter was not my favorite, it is necessary in understanding what makes a complete network security policy. The author continues to provide great information throughout this book. One chapter is devoted to router security, which includes a detailed template on what should be configured on the router. I have looked for a long time to find just a few of the valuable commands and their definitions. You're introduced to firewalls and DMZ's the core devices that are used to implement security or both private and corporate networks. Then you are taken on a journey into the world of IPSec and VPNs. The chapter helped to introduce a relatively new technology in the data world. Security protocols are also explained in this book. This provides the user with a good introduction to the commonly used protocols that are popular n today's networks. Just when you think you're knowledgeable he introduces intrusion detection, which is rapidly becoming the talk of the security world.
This book is filled with so many websites on every, and I mean every aspect of network security. The tools used by both the good guys and the bad guys are presented in almost every chapter. I like the fact that the author tries to provide information on the areas of network security. One can argue that too much information or references are provided. However I feel that you need to be aware of what you're up against in order to provide effective security for your network. You can't defend against tools or methods if you don't know about them. This book provides a very liberal approach to learning network security.
Bottom line is this book is a MUST have for anyone that is interested in learning or joining the network security field. You will find the solid foundation you need, but don't worry there are tons of website links that you can find within these pages that can further your knowledge. I have to say if you don't read this book you're not serious on network security. If the book doesn't get you interested in this field nothing will. BUY IT TODAY!!!
Brion
Senior VOIP Engineer,
Telepacket, Inc
Rating:  Summary: Great book for all network security beginners Review: This book provides a solid introduction to the world of network security. As a newly assigned security person for my company, I am finding it an invaluable resource.
All the subjects are presented in an easy to understand format with chapter reviews and helpful "note" sections that highlight
important ideas.
With the content provided you can easily build a solid security policy for your company.
Rating:  Summary: A "must have" for anyone involved in Network Security Review: When it comes to a broad topic such as Network Security, the guidelines become obscured with millions of factoids available everywhere. Organizations coming to you left, right, and center vying for attention and trying to instill fear and uncertainty in your network. Giving you examples of how an insecure network can ruin a company, or worse, ruin several companies with a single attack. Well, that is just fine for those who have been in the field for a while and know what is expected of them, but what about the student who wants to get into this ever-expanding field? Or the professional that has been "out of the loop" for several years, how is he or she going to be introduced to the Network Security spectrum as it stands today? The answer, my friends, is in this book.
The very first chapter is devoted to what we as security professionals are up against... Hackers! After all, you can give a blind man a rifle and tell him to defend himself, but if he doesn't have the knowledge to "see" the enemy, how can he possibly do that? Tom delves into the mind of a hacker and shows you how he or she can enter your network through vulnerabilities, using tools (which anyone can use) or by using a method called "social engineering."
The layout of the book is simply brilliant. Each chapter has an outline in the beginning, showing what you are expected to learn. For those that like to just "skim the pages," it allows for that as well. Not to mention the review questions at the end of each chapter give you an opportunity to evaluate your current level of knowledge.
I know some of you out there are saying, "What about Wireless Network Security?" Well, Tom goes into that issue too, from giving diagrams showing how to import a physical firewall into your network, to showing you how even that can be exploited. Tom has gone to great lengths to show us the "bread and butter" of the internet and how it can ruin or enrich our lives through proper network security.
Given the fact that this is a "first-step" book, it just scratches the surface of the issue. Think of this release as a smorgasbord, it gives a wide scope of how the internet and network security works, but it leaves you thirsting for more knowledge on the subject.
|
|
|
|