Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
||Author: Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey|
List Price: $49.99
Our Price: Click to see the latest and low price
Publisher: Que (28 June, 2002)
Sales Rank: 4,683
Average Customer Rating: 4.86 out of 5
Customer ReviewsRating: 3 out of 5
Fairly decent but can be thinned out a bit
Fairly decent overview of perimeter security. If your a security professional you may learn a thing or two, if your a network administrator and your idea of security is a firewall then this book is meant for you. Its a fairly easy read, but some of the examples of the commands to enter in configuring routers and hosts could be eliminated. I felt the author was just taking up space with these examples. (not a big deal but I'm taking a star away on principal) I also felt the author could have gone into a little be more detail in the VPN chapter, especially when dealing with encryption, PKI, and authenication which I felt was glossed over. (again not a big deal, but when you call yourself the definitive guide, be more definitive and save the 'commands' for the user guides")
Rating: 5 out of 5
Excellent Resource for Security Professionals
This book is no doubt an excellent resource for security professionals, all chapters give very good info on Perimeter security. Good for those preparing for SANS GCFW Certification.
Rating: 5 out of 5
Excellent Network Security Book
This is a very well written book by a group of very experienced practitioners and teachers. Each chapter reflects their experience and the SANS Institute's no-nonsense approach to teaching highly technical security subjects, making the book a worthwile read for security administrators, analysts and engineers.
Every chapter starts with an introduction to the subject where general aspects are being highlighted in a way that they can be grasped by non-technical people too. From there the authors quickly jump to explaining the hard, technical details. Pros and cons of individual technologies are being discussed, giving expert opinion to those looking for help in deciding about technology choices. A summary, again readable by everybody and their manager closes each chapter.
This is the first book I've seen that groups together and relates all subjects relevant to network perimeter defense. Well chosen diagrams and "real world stories" make it an enjoyable and entertaining read. Highly recommended.
· Anti-Hacker Tool Kit
· Intrusion Signatures and Analysis
· Snort 2.0 Intrusion Detection
· Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition
· Network Intrusion Detection (3rd Edition)