<< 1 >>
Rating:  Summary: Good and Easy! / Very Useful! Review: From TCP/IP Stack to Network Security... It's very useful, fun and easy. Thanks~ nagie, cow, loger!
Rating:  Summary: good information, bad detail and examples Review: I found this book hard to read, especially right after having read a very well-written network security book ("Network Security": Kaufman, Perlman and Speciner). The grammar and sentence structure aren't *bad*, just hard to follow - the text doesn't flow well. Another problem is that some of the examples and details are just plain wrong. If you don't know anything about networking beforehand, the introductory section will leave you confused.On the plus side, if you wade through it, it's got a lot of very good information on the IPSec suite of protocols.
Rating:  Summary: Not much more useful than the RFCs Review: I looked at this book when I was just starting out working on IPsec. I had read the RFCs once but felt I needed a good book since the IPsec protocol is pretty complex and the RFCs are not very well written. I did not buy this book but scanned it thoroughly in a bookstore. The book seems to repeat what the IPsec RFCs say without adding more to it. There are very few figures in the book to explain the concepts. I ended up buying "Demystifying the IPsec Puzzle" by Sheila Frankel which is a much better book.
Rating:  Summary: Great for the beginner and helpful also for the expert Review: This book has everything that you need to know about inet security. Doraswamy and Harkins start at the beginning and explain things for the true novice in a way that can easily be understood evne for those without a technical background. The rest of the book is extremely thorough and even an expert should learn quite a bit. I can't think of a thing that has been left out. I have been in the field for over seven years and I learned a thing or two. As the security manager of a medium sized firm, I give a copy of this book to all of my new employees.
Rating:  Summary: Informative and Useful Review: This book is a description of IPSEC as opposed to any vendor's specific implementation. As such it is a good grounding on the subject. Some sections are heavy going, with detailed explanations of IPSEC protocol without effective examples, the information is still useful however. An understanding of cryptography is useful in following the book, whilst an introduction is provided it is very basic. Appropriate references are given for further information and related standards, overall a good read.
Rating:  Summary: A good book for IPSec beginners and refreshers Review: This book is a good recap on IPSec if you have not been working with IPSec for some time. I recommend this book for begineers to IPSec implementators and it is a good reference book to have handy. The first few sections explain the basics of IPSec and are very well detailed without getting into the specifics. However, the sections on IKE are not well explained and it lacks real detail of IKE implementations and no good diagrams. I found this book an excellent recap of IPSec as i have not worked with IPSec for almost 3 years, and instead the book gives good and concise information but is mostly in a synopsis format and lacks the real meat.
Rating:  Summary: Very easy, fun and useful! Review: This book is not very hard. About IPSec, Internet Key Change and implementing. MCSE gettabeam's recommended it!
Rating:  Summary: IPSec implementation Review: This book was short but had very detailed information on the new emerging IPSec protocol. I am an IP Security Engineer for Nortel Networks and have found that this book as some very useful information when it comes to troubleshooting IPSec in a VPN solution. I would recommend this book to anyone who needs to have an understanding of the IPSec architecture or even if you are just getting into security.
Rating:  Summary: Good, Concise & Specific for IPSec Review: This is not a thick book, just about two hundred not including the index. It's targeted at IPSec including architecture, Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE). I read the book page by page but got stuck in IKE. Maybe more explanation & examples can help readers to fully understand the mechanism of IKE. After I finished the book, I got the feeling that I need another IPSec book to clear up my confusion..... BTW, this is my first book on IPSec!!
<< 1 >>
|