Customer Reviews

14
4.0 out of 5 stars
Your rating(Clear)Rate this item


There was a problem filtering reviews right now. Please try again later.

on February 24, 2015
ok
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on March 21, 2013
I was looking for something for someone just learning about Cisco switches. This has some good information but not what I was exactly looking for
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 3 people found the following review helpful
on August 17, 2002
As I am currently working on my Cisco Security Specialization (CSS) I have read all books related to CSS. Out of the four books this is definately one of the most valuable references when it comes to Cisco network security. This book is well-structured, referencing all the potential threats and countermeasures that exist to network security. I really praise the author for his clear explaination of IPSec and PIX concepts. For those seeking to pass the MCNS 2.0 exam, this is a great reference and study guide. All necessary topics are covered, except the Cisco VPN Client, which has been added to the MCNS exam during version 2.0. Overall, a great book by a great author, a definite must-have for the future CSS1, CCIP/CCIE security specialists.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 4 people found the following review helpful
on May 12, 2002
This book has good coverage of all cisco security technologies. PIXes are there with intense detail but no config examples with access-lists at all. All examples use conduit and static. I wont blame it as this book is published in Jan 2001 and pix access-lists became famous around the beginning of this year. The biggest problem is config mistakes, i wasted hours to figure them out and finally decided that they r definitely wrong. So read it but watch out for mistakes. 3 stars becoz of this
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful
on April 11, 2002
Cisco Press is funny because some of their books series are error-few and others are error-some. I really liked the content of this book though. I reference it for specific subjects as much or more than any other good book I own. I wish that it would give better descriptions of more detail on some key commands and not just the cut and paste of the command in the description field. Other than that there is a broad range of decent security info.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
5 of 6 people found the following review helpful
on January 18, 2002
They should contact Guinness on this one. Almost every page has some type of error. (Mislabeled IP addresses, mistyped configs, etc.) It's amazing! Seriously though, the content in the book is good. However, the number of errors is bad. If there weren't any errors, I would have given it a 5.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
5 of 5 people found the following review helpful
on December 11, 2001
This is a must have book if your going for Certification. However, If you just want to learn how to work the different components I would recommend "Cisco Secure Internet Security Solutions" CSISS is not as wordy as this and gets into the nuts and bolts of the components.
MCNS is excellent for those who may normally tend to ask more questions in class, or may have a little trouble understanding the theory behind the components.
These two books go Hand-in-Hand to give you not only the certification but the know how to use the Cisco Secure Components.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
7 of 8 people found the following review helpful
For those of you who work on the PIX Firewall from Cisco and need to be trained on the finer points of the application, you'll find this book is right up your alley. The author has put a great deal of effort in this manual and results give you the best possible book on the topic I have seen so far.

In over 750 pages this manual is broken down into five parts, each building on the section before. The amount of information included is very detailed and well documented and I can see another volume of information on the horizon.

In part 1 this is where you learn to set up the security policy dealing with threats, denial of service attacks and the hacking process. Also covered the security policies and securing the switches and routers.

Part 2 moves to dial-up security with the use is Cisco's AAA security, PPP, CHAP, PAP, TACTAS+, ACS and Radius are the major topics covered. Showing the different ways to ensure the dial in accounts are the only things creating traffic that will enter into your network.

In Part 3 the author shows that the secure internet connection is one of the most important parts of the network security scheme. Topics include the setting up of the DMZ, using and working with the bastion host, firewall with NAT and PAT, and the Cisco PIX Firewall.

Part 4 is the PIX Firewall section where you learn about the configuration of the PIX firewall, configuring multiple interfaces and AAA encryption. Finally part 5 which deals with VPN and IPSec. The author does ensure an understanding of IPSec, configuration and configuration with PIX rounds out the Section.

Case studies are included, examples of the router code, an abundance of other examples and well as hands on tasks makes this a must have for everyone network manager, administrator and security specialist.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 2 people found the following review helpful
on November 3, 2001
As mentioned by another reader, this book will not cover cryptographic mechanisms in details.
But it will give you an overview of everything you can do with Cisco products (relating to security), how to do it and where to find more information.
I read all Cisco books about security and this one is the more complete.
If you need to understand cryptography, you need books like Applied Cryptography.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 3 people found the following review helpful
on October 29, 2001
It doesn't get five starts because it lacks information about Intrusion Detection, which is an important part of Network Security. The rest of the book is excellent, not only for the CSS1 & CCIP certification (it can be a guide for the 640-442 MCNS, 9E0-571 CSPFA & 9E0-570 CSVPN (you need additional info on the VPN 3000 and the CS VPN Client for this exam)) but also as a reference book for implementing security on Cisco Networks.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Send us feedback

How can we make Amazon Customer Reviews better for you?
Let us know here.

Your Recently Viewed Items and Featured Recommendations 
 

After viewing product detail pages, look here to find an easy way to navigate back to pages you are interested in.