Buy Used
$0.01
+ $3.99 shipping
Used: Good | Details
Sold by Slategray Books
Condition: Used: Good
Comment: Good condition with moderate wear. Does not include dust jacket.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Mastering Network Security with CDROM Paperback – December, 1998


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
$16.73 $0.01

There is a newer edition of this item:


Half-Life by Frank Close
Half-Life by Frank Close
Check out the newest book by Frank Close. Learn more | See related books

Editorial Reviews

Amazon.com Review

In Mastering Network Security, Chris Brenton presents a complete portrait of all the things that can go wrong with a computer network and provides a thorough discussion of the tools available to counteract them. This book proceeds to explain how malicious software, external attackers, angry insiders, software bugs, and other evil entities can bring down a system. Most of the focus here, however, is on system attacks from the outside. Brenton devotes much attention to the tools you can use to thwart attackers.

This book walks the reader through a security audit and the process of developing an effective security policy. While some of the author's advice in this area may seem like common sense, it's helpful to have the many related issues summarized. Then, on the theory that it's easier to secure territory you know well, Brenton provides an overview of internetworking technologies--notably, Virtual Private Networks (VPNs)--and their inherent security characteristics.

Mastering Network Security shows how to implement security measures--including logging, encryption, and packet filtering--on your existing network infrastructure. (He provides specifics for Unix, Windows NT, Cisco IOS, and NetWare). The author also writes at length about supplementary security measures such as firewalls (especially Firewall-1), intrusion detection systems (focusing on RealSecure), and RAID data redundancy (with emphasis on OctopusHA+). --David Wall

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Mastering
  • Paperback: 672 pages
  • Publisher: Sybex Inc; Bk&Cd-Rom edition (December 1998)
  • Language: English
  • ISBN-10: 0782123430
  • ISBN-13: 978-0782123432
  • Product Dimensions: 9 x 7.4 x 1.7 inches
  • Shipping Weight: 2.6 pounds
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (18 customer reviews)
  • Amazon Best Sellers Rank: #4,726,586 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.7 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

9 of 9 people found the following review helpful By Richard Bejtlich on June 14, 2000
Format: Paperback
I imagine Chris didn't choose the exact title of this book, as it is another of Sybex's "Mastering..." series. He would probably agree that no single book or combination of books will produce a security "expert." Regardless, I was surprised at the scope of material and Chris' ability to explain it well. I am trying to broaden my security horizons beyond intrusion detection, and I found this book well organized, logical, and amazingly pertinent almost two years since it was written. I found what I believe are very minor errors (e.g., details of a FIN scan), but I can't fault anyone who attempts to capture so much information in one volume. I will recommend my intrusion detection analysts add this book to their reading lists. Thanks Chris!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 9 people found the following review helpful By A Customer on September 7, 2000
Format: Paperback
Technical books tend to bore me to death but I managed to worked my way through this one. The author didn't write it in typical egghead-ese that one might see with any book focused on a such a complex arena of computing. I learned quite a few concepts with this one.
I purchased the book primarily based on the ratings here and want to thank the other reviewers. They were right on with their reviews. This one is a must-read if you're even remotely interested in network security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 12 people found the following review helpful By A Customer on September 14, 1999
Format: Paperback
I agree with a previous reviewer, the word "Mastering" could be substituted by "Introducing". The book gives you a good overview on all aspects related to network security and it assumes only minimal previous knowledge from the reader. There are specific chapters covering Cisco ACL configuration and Firewall-1 setup, OK for the first but I found the FW-1 chapter tedious.
All in all a good book for learning the fundamentals but if you are serious about security you'd have to read more.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 12 people found the following review helpful By A Customer on November 1, 1999
Format: Paperback
Mr. Brenton does a good job of giving the uninitiated a good starting point in network security. The majority of his examples are NT-based (which is good because the majority of the people reading this are going to be NT-centric as well) but he also gives some excellent insight into NetWare and UNIX/LINUX as well. Although I was looking for something a bit more advanced, I thought that this book was an excellent book to begin the long road of network security with.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By A Customer on May 27, 1999
Format: Paperback
After reading the author's long list of covered subject matter, I really expected this to be mostly a theory book. While the book does include theory (I think I finally understand passive and active FTP and how they work), I was really surprised at how much hands on material the book has. For example there is step by step instructions on how to setup and use the included IDS and firewall software. I would say the instructions are even better than the product manuals! This type of step by step instruction continues as the author walks you through creating Cisco access lists, VPNs and even securing different operating systems. This is a great book for someone like me who does not consider themselves to be a "security guru" but still needs to lock down their network.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By A Customer on July 22, 1999
Format: Paperback
This is a very cool book. The first couple of chapters contain a lot of ammunition that can be used to justify extra $$$ for securing your environment.
The book then gets into how all the pieces of a network fit together. I thought this was a little odd for a security book but found it much easier to follow the later material than I have with other books. The author lays down a great foundation so that its much easier to follow the higher end stuff like locking down a particular operating system and why certain steps are important.
This book is definitely one to keep handy long after its been read!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 9 people found the following review helpful By Clayton T. Dillard on August 2, 2001
Format: Paperback
Overall this text is slightly better than good. After reading almost the whole book I found that for someone interested in theory and not so much in technique, this is a good read. It does go over some good points about planning your security model and gives good advice on how to approach security in your organization. It even goes through a basic install of CheckPoint FW-1 for NT. Topics including policy, legal issues and the user's ability to comply with policy are interesting but not why I bought this book. I thought Chris put some good information in this text but the title doesn't accurately match the content.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 8 people found the following review helpful By A Customer on August 7, 1999
Format: Paperback
Excellent book for people who wish to get a good introductory course to Network Security. I found it a valuable resourse for understaning major fundamental concepts. It is definately NOT oriented for people experienced in security, so the word MASTERING is not suitable. In every other aspect I found Mr Brenton an excellent writer who is impossible not to understant the topics he covers (if you know a bit of networking that is). Good job Mr Brenton...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again