Firewall Policies and VPN Configurations and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $54.95
  • Save: $7.65 (14%)
In Stock.
Ships from and sold by
Gift-wrap available.
Add to Cart
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by lomaxdirect
Condition: Used: Very Good
Comment: Book is in very good condition with minor wear to cover, tight binding.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Firewall Policies and VPN Configurations Paperback – Illustrated, September 20, 2002

ISBN-13: 978-1597490887 ISBN-10: 1597490881 Edition: 1st

Buy New
Price: $47.30
28 New from $19.24 19 Used from $4.04
Amazon Price New from Used from
"Please retry"
Paperback, Illustrated
"Please retry"
$19.24 $4.04

Frequently Bought Together

Firewall Policies and VPN Configurations + Configuring SonicWALL Firewalls
Price for both: $82.65

Buy the selected items together

Customers Who Bought This Item Also Bought


Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 550 pages
  • Publisher: Syngress; 1 edition (September 20, 2002)
  • Language: English
  • ISBN-10: 1597490881
  • ISBN-13: 978-1597490887
  • Product Dimensions: 8.9 x 7.1 x 1.4 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 2.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Best Sellers Rank: #2,573,032 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.

Abhishek Singh is a Security Researcher on the Microsoft Malware Protection Center (MMPC) team, where he performs analysis of vulnerabilities to develop signatures. He was previously employed with Symantec as a Senior Software Engineer. He was also one of the initial technical members of the Third Brigade Security Center, now part of Trend Micro. He has also worked for SafeNet.

Abhishek was a leading inventor of various patent pending technologies in IDS/IPS and an algorithm for faster analysis of binaries and two-factor authentication. He served as Technical Editor for "Vulnerability Analysis and Defense for the Internet" and "Identifying Malicious Code Through Reverse Engineering." He has published Internet Drafts and security-related papers in primer journals and for various conferences.

Abhishek holds a Master of Science in Information Security and a Master of Science in Computer Science, both from the College of Computing, Georgia Institute of Technology and a B.Tech. in Electrical Engineering from Institute of Technology, BHU, India.

Customer Reviews

2.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Most Helpful Customer Reviews

5 of 6 people found the following review helpful By B. S. N. Bilgisayar on September 12, 2007
Format: Paperback
I am sure that, I wouldn't have bought this book if someone had reviewed this book before me.
Briefly, if you are looking for a deep information on several brand firewall's configuration and especially on VPN subject, belive, this book is not for you.
The first half of the book is full of with just generic information which almost avery avarage IT people have. That is, whithin a few minutes you pass the first two part.
Than you decide your point on this book while reading the VPN part. No detail on the issues, no real time application samples and most important one completely wrong several figures.
For example, on page 247 figure 5.20 says "MPLS Packet Structure", but you see screen snapshot of Putty telnet application's configuration window. I honestly couldn't understand if they are joking or have another purpose.

My only advice, always prefer the books you can look inside it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

What Other Items Do Customers Buy After Viewing This Item?