Designing Network Security (2nd Edition) and over one million other books are available for Amazon Kindle. Learn more

Designing Network Security 1st Edition

17 customer reviews
ISBN-13: 978-1578700431
ISBN-10: 1578700434
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$0.01
In Stock. Sold by Pennsylvania Book Depot
Condition: Used: Very Good
Comment: Lightly read book, still in great shape!No questions return guarantee, great value!
Access codes and supplements are not guaranteed with used items.
30 Used from $0.01
+ $3.99 shipping
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover, June 15, 1999
"Please retry"
$11.20 $0.01
More Buying Choices
10 New from $11.20 30 Used from $0.01 1 Collectible from $9.96

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


InterDesign Brand Store Awareness Textbooks

Editorial Reviews

From the Back Cover

A practical guide to creating a secure network infrastructure


* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation scenarios for securing your network environment

Designing Network Security is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and some emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the dial-in environment.

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

About the Author

Merike Kaeo, CCIE No. 1287, has been in the networking industry for more than 15 years. As a member of the IEEE and IETF, she brings a wealth of technical and practical knowledge to the community, helping professionals to understand complex networking concepts. Merike was employed with Cisco Systems, Inc., beginning in June 1993, where she worked primarily on technical issues relating to router performance, network routing protocols, network design, and network security. From 1988 to 1993, Merike worked at the National Institutes of Health in Bethesda, MD, designing and implementing the original FDDI backbone for the NIH campus using Cisco routers. She received her BSEE degree from Rutgers University in 1987 and completed her MSEE degree from George Washington University in 1998.
NO_CONTENT_IN_FEATURE


Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Series: Cisco Press Fundamentals
  • Hardcover: 426 pages
  • Publisher: Cisco Systems; 1st edition (June 15, 1999)
  • Language: English
  • ISBN-10: 1578700434
  • ISBN-13: 978-1578700431
  • Product Dimensions: 1.2 x 7.8 x 9.5 inches
  • Shipping Weight: 2 pounds
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (17 customer reviews)
  • Amazon Best Sellers Rank: #3,609,604 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

14 of 14 people found the following review helpful By A Customer on September 11, 1999
Format: Hardcover
Exam 640-442 is the Security Specialistization for people who have attained their CCNP certification. Excellent coverage of AAA, TACACS+, RADIUS, PIX, 3DES, DMZ as well as IPSEC and CBAC. This is alot of material to be discussed in one book. Cisco provides a CD ROM with this same material for $250.00, this is a much better deal. If you want to enhance your knowledge of access-lists, reflexive access-lists etc. this is the book for you. Merike did her homework on this material, I completed many of the configurations presented in the book, they were accurate.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
14 of 14 people found the following review helpful By John B. Harlow on January 8, 2000
Format: Hardcover
Excellent overview of network security issues. Covers almost all threats, protocols and safeguards in a concise manner. One of the books that should be read for CISSP preparation.
Bogs down when it gets to Cisco specific configurations. As a CCIE, even I find that books of this type provide only the tip of the iceberg when it comes to the complexity of Cisco configurations.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 11 people found the following review helpful By Fruitcake on October 30, 2000
Format: Hardcover Verified Purchase
Up through Chapter 7, this book presents a fairly good overview of information security in general, network security basics, cryptography, and a good measure of "security philosophy" as well. It reads pretty well and there are relatively few inconsistencies, until...
From Chapter 8 onwards, there are lots of mistakes (my personal favorite is a botched explanation of TCP proxies on page 248) and many cases of examples not matching the explanatory text. And when it comes to enabling TACACS+ on routers, some sections of this book directly contradict Cisco's "IOS 12 Network Security" book.
All in all, a decent reference for Cisco routers & firewalls, but you might want to supplement it with something more substantial. The O'Reilly books and Cheswick/Bellovin come to mind...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Stephen Northcutt on May 11, 2004
Format: Hardcover
This is a big book, 745 pages, a bit about almost every topic in information security. The advantage of a book like this is that if you want to know three paragraphs about a security term that you are not familiar with, you can find it. The disadvantage of these survey type books is that they do not usually give you enough information to do anything.
Though there are some spots especially in the first few chapters where this happens, Merike Kaeo, the author, quickly succeeds in making this a book that goes beyond telling the reader about things and begins to share how to do things on Cisco equipment which is far more valuable. If you are a Cisco network engineer or administrator and are interested in learning more about information security this is probably a good book for you. I think this book would also benefit a manager or someone with purely theoretical information security knowledge that wants to be able ask technical people pragmatic questions.
The Voice over IP chapter was one of the clearest explanations I have seen, however a bit more of a warning about security, changing standards and interoperability would have been appreciated.
When work begins on 3rd edition, I would suggest more focus on using routing and switching technology to segment the internal network so a worm infection does not take down the entire facility. In general user VLANS to not need to talk to other user VLANS, they only need to communicate with servers.
My favorite part of the book is Appendix D, somehow I had never seen Rob Thomas paper on DDOS.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By A Customer on August 9, 1999
Format: Hardcover
I really enjoyed reading this book. Lot's of information pertaining to PIX, Access-lists, Distribute Lists, IPsec. Every angle was covered, I compared to the Cisco 12.0 Ios Network Security book, this one had more detail. Which is difficult considering how much is covered with Cisco documentation. If you've read the articles pertaining to Cisco's investment in the Security market, you've got to have this book. This book is the security what Halibi's book is to BGP.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Paul Miller on December 29, 2003
Format: Hardcover
I recently read the book titled "Designing Network Security" by Merike Kaeo. ISBN: 1587051176. This book happens to be the second edition of the title. This book is an excellent source of information regarding network security and security in general. The book covers a broad scope of technologies and areas relating to security. Probably the single best source for security topics in one book that I've read. It's an A-Z book on security.

The fading lines of responsibility in the realm of security is pretty much forcing every Information Technology (IT) professional to play a role in today's security strategy. With the boundaries being sketch well with in most every facet of Information Technology, it leave a big gap as to what the everyday IT professional can understand and contribute to a successful security architecture. This book, in my opinion, does an excellent job of bridging that wide gap for most networking professionals. I think every networking professional should have a copy of this book on their desk.
This book is best suited for professionals with a beginner to intermediate level of understanding of security principles, concepts and technologies. This book is essential for professionals looking to keep up with the ever-changing world of IT. Having this book will allow you to understand some of the more challenging and complex concepts that face each and every IT professional regarding security. Persons that are interested in achieving the popular Certified Information Systems Security Professional (CISSP) certification would find this title very helpful, not just as a resource to pass the exam, but also as a valuable reference to continue to learn from even after becoming certified.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?

Want to discover more products? Check out these pages to see more: network security, networks, linux security