Amazon Vehicles Up to 80 Percent Off Textbooks Amazon Fashion Learn more Discover it Dolly Parton Fire TV Stick Happy Belly Snacks Totes Summer-Event-Garden Amazon Cash Back Offer ElvisandNixon ElvisandNixon ElvisandNixon  Amazon Echo  Echo Dot  Amazon Tap  Echo Dot  Amazon Tap  Amazon Echo Introducing new colors All-New Kindle Oasis Shop Now
Profile for Joel E. Natt > Reviews


Joel E. Natt's Profile

Customer Reviews: 10
Top Reviewer Ranking: 37,997,280
Helpful Votes: 35

Community Features
Review Discussion Boards
Top Reviewers

Guidelines: Learn more about the ins and outs of Your Profile.

Reviews Written by
Joel E. Natt RSS Feed (Atlanta, GA USA)

Page: 1
Firewall Fundamentals
Firewall Fundamentals
by Wesley J. Noonan
Edition: Paperback
Price: $48.89
40 used & new from $8.86

7 of 8 people found the following review helpful
4.0 out of 5 stars Cisco's Replacement for a Dummies Guide to Firewalls, July 23, 2006
This review is from: Firewall Fundamentals (Paperback)
Firewall Fundamentals provides what I see as the first clear book in many years on the oldest known protection for the Information Technology field. Authors Wes Noonan and Ido Dubrawsky take the concepts of protection at the basic level and slowly walk the reader through protection and defense from the introduction of threats to the details of advanced firewalls like the Cisco PIX and ASA appliances to Microsoft's ISA application. While this book may to be advanced in nature, it explains in detail the simple items that make the understanding of Firewalls and their technology important. Even from the goal of the book "...personal and desktop..." where the authors clear state that no level will be untouched does this book make one feel comfortable and unafraid.

Considering that this is a Cisco Press, book it surprised me that the amount of non-Cisco detail the authors' included, from Checkpoint and Microsoft ISA in the larger areas to Trend-Micro in the smaller areas. These guys ensured in this book a level of detail and understanding that will guarantee a complete read; even a Security Engineer, like myself who has learned the advanced concepts and deployment methods/reasons for security, gained new insight into the world I work in. For both Noonan and Dubrawsky present the items I sometimes miss, the obvious and clear issues that the regular individuals encounter and need to help them.

Noonan and Dubrawsky start with the simple items and basic concepts slowly and adding to them while not forgetting the assumed reader. This book is divided into four sections including the Appendixes: The first of the major section as always the Introduction which covers the basics from what a threat is to the difference between a personal (computer) based firewall to a network firewall.

After the basics are covered the authors' begin moving into the how of firewall technology from the personal computer to the common home-office like Linksys and finally into the realm of small office and hardware that include the Cisco platforms. While these chapters may appear to focus more on the Cisco Products they do include important other chapters that deal with items like where a firewalls belongs within the network. Within this section of the book we see items as mentioned like the Linksys and Cisco products, but we also see NetFilter and other freeware and pay products including Microsoft's ISA and Checkpoint mentioned, configured and discussed in detail. Within Chapter 7 the Linux products that are slowly advancing in the industry due to their cost and availability are detailed with the NetFilter product. Flow-charts and diagrams again help to explain not only this product, but the key concepts behind firewall technologies and examples of scripting help individuals learn and understanding what should be occurring with the product.

Finally the last key section deals with the importance of Managing and Maintenance any Firewall. From policy management to troubleshooting they do not leave anything out. I personally found the chapter entitled "What is My Firewall Telling Me?" very different from what I would expect in a simple how to read the logs chapter. The authors took time to explain the concepts of logging, the importance and different methods to read the log. Again they showed that this is not a book that is Cisco centric on Cisco heavy by using products and screen shots of non-Cisco items like Microsoft and NetIQ.

What this book is missing is a disclaimer that while published by Cisco Press it is not entirely Cisco Centric and this is a good thing. Yes as many people know Cisco is a large player in the field of networking and information security these author's do everything to ensure a fair and equal play of the others I have mentioned before. I feel that if you where looking for a book to help anyone with a small or home office environment protect it, this is the book you need. While I found adding it to my collection a positive and enjoyable experience, I can only hope that you will too.

Cisco ASA and PIX Firewall Handbook
Cisco ASA and PIX Firewall Handbook
by Dave Hucaby
Edition: Paperback
42 used & new from $0.32

1 of 1 people found the following review helpful
5.0 out of 5 stars The Ultimate Handbook and Guide for any Firewall Engineers and Administrator, November 7, 2005
I do not think the subtitle "The Complete Guide to the most popular Cisco firewall security features" goes to the level of credit that this book truly goes too. David Hucaby did not only write a guide, he wrote a book that will clearly sit on my quick grab shelf right next to my desk for years to come (or until the next version). For as the introduction states "the book is meant to be used as a tool in every day activities." and that is clearly what it does. David wrote for both from the introduction and the structure of the book to the index, a complete guide and tool that deserves ranting and raving. As you begin flipping through the book the knowledge and understanding of how a security engineers or administrator operate becomes clear. While the structure alone being designed to support both chapters and sections within the chapters, help to ensure details are easily located and quickly referenced. Combine with the detailed index in this book, ensure he does not miss a beat. From the beginning you see the level of both understanding and time that was done when David wrote this book.

Not only is David's book designed to be more than a reference guide. By going through the step by step process and understanding, but it details numerous features, commands and methods to help individuals understand what they are seeing or expecting. While exploring the book I found several nice facts including a quick bit in chapter 3 "Configuring Interfaces" where David talks about Priority Queue and the differences between current 6.x and new 7.x code. As we have learned with PIX code up to version 7.x it was all best-effort, but then has begun to change for the future. Thus this section while small is an excellent section to show the detail packed and excellent example of why this book needs to be on every security engineers and administrators desk or bookshelf. Other features in this book is provide us the reader with excellent examples of the evolution of Cisco's firewall operating code as it moves from version 6.x to 7.x platform.

Cisco has begun to introduction new features and support new platforms like the Firewall Service Module (FWSM) and the new Cisco ASA into an already growing product line in high demand. With the book David spends time showing how the same configuration items behave with each different code level or hardware platform that Cisco has introduced and currently supports. This alone can clearly help any individual attempting to understand and compare Cisco Firewalls product lines. Yet while this is another excellent example of why the book is a must have, the final that comes to mind is the detailed Appendix's that David has included from a complete list of error codes for all PIX syslog errors or messages to A "Well-Known Protocol and Port Numbers" section.

At one point I found myself looking from chapter to chapter and spot to spot without realizing I was jumping around. Cause regardless of where you are in the book you too will find yourself jumping around to either review something or cross-reference an item. If I was to change anything in the book, it would be the cover cause the material is as perfect as possible considering the length and time clearly spent learning and comparing the differences that the book contains. Why do I say the cover needs to be changed you ask? Well I think that as a security engineer or administrator you will be referencing this material so much that the soft cover will become damaged and show the wear and tear that comes with true usage and appreciation of a book of this caliber.

Build the Best Data Center Facility for Your Business
Build the Best Data Center Facility for Your Business
by Douglas Alger
Edition: Hardcover
38 used & new from $4.46

5 of 5 people found the following review helpful
4.0 out of 5 stars Guidance for Building a Data Center, October 7, 2005
When individuals consider recent events from natural disasters like hurricanes and earthquakes to terrorist attacks like September 11th, not to mention new government regulations within areas like HIPAA and Sarbanes-Oxley the need to secure organizations information is becoming more critical. Thus an organizations desire to design and/or construct a data center that will meet these needs has increased.

With in the book "Building the Best Data Center Facility for Your Business" by Douglas Alger guidance for items that need to be considered are presented in a detailed format. The general population and most companies assume that they can set a computer room or data area up without any issues or difficulties, hence it is always assumed that if you have knowledge of Server and Network design and someone that has an understanding of construction you can do it. But when you design a Data Center and consider items like power usage and cooling needs, you need to consider other items like fire suppression and redundant power sources. Within Alger's book we see items that most computer engineers will take for granted like raised flooring, and HVAC (cooling). But we also see items that some may consider common sense like generator power and supply guidance for fueling these generators.

This book I found an excellent baseline and for as the author said in the introductory pages "Setting up a data center is easy. Except that the first time you do it you're going to screw up badly." Hence as I read this book I found myself returning to discussions and implementations I did a few years ago and could see where we made mistakes and learned from them. Alger was correct in his statement and I was further able to reflect in my mind on the discussions that we had on items that included spacing and area needed for computers and networks then on topics like power utilization and cooling needs where always being considered. As I mentioned Alger's book provided me with reflections and will provide anyone reading it individuals with the needed initial guidance on either building or what to consider when improvements both a computer rooms or a data centers. While this book may appear small at only 374 pages including the index, its detail and guidance will add to anyone's knowledge or needs.

Some of the information and definitions like what is a "U" and the difference between DC and AC power are discussed ,but also items like how to properly clean the room with pH neutral items and services as well as how to gather metrics only enhance the books value and understanding. While the book does limit itself to certain rack sizes and power utilizations not comparable with newer equipment occurring today, it does provide an excellent guideline.

I can only hope that you like myself find the book informative and consider it, if nothing more than a guidance on how to work with a proper computer room and data center environment.

Definitive MPLS Network Designs
Definitive MPLS Network Designs
by Jim Guichard
Edition: Hardcover
31 used & new from $26.48

5 of 6 people found the following review helpful
5.0 out of 5 stars The New WAN Network, May 16, 2005
Your organization has grown and the simple wide area network (WAN) you are responsible for and familiar with needs to grow to support the needs of that change. Now the WAN is preparing to enter the next generation technology and expand from either a simple point to point and point to multipoint environment to a global diverse cloud environment and you are tasked to learn about this new technology and implement it. Most likely you are in the networking team and/or the architecture group within your organization and it is your job to do this and do it right the first time.

The amount of information on new WAN technologies is enormous and ever growing. As anyone in the network world knows various providers will have their solutions and offer numerous products and options, but it will be your job to understand these solutions and advise your management team on the best options available. Thus, you will need to learn and refer to items at various intervals. One of the newer technologies that is gaining strength in the WAN environment is Multiprotocol Label Switching or MPLS and could be the ideal solution for you. With "Definitive MPLS Network Design" you will be able to take the first important step to accomplishing this goal and ensuring that the process and planning is accomplished correctly. When I first looked at this book, I assumed it was nothing more than an enhancement to the concepts of Frame-Relay and point to point connections, but as I ventured further into the book the inclusion of IPv6 information and Network Engineering items proved my initial assumptions where not only incorrect but extremely off base.

This book will not only provide the first step, but also provides the guidance and hand holding to help you navigate the land of uncertainty that is MPLS. As you start reading about MPLS, you will discover that it is a different type of Wide Area Networking. It is a entirely new concept -- no more leased T1 lines or frame relay clouds, now the concept of point to multipoint and beyond take on an entirely different meaning and theory.

Jim Guichard and his fellow authors, Francois Le Faucheur and Jean-Philippe Vasseur, define not only the concepts like PE (Provider Router) and CE (Client Router) but detail step by step the assembly of the cloud that will be needed to ensure a complete implementation of any MPLS solution. Included are numerous routing features of items like BGP and EIGRP, as well as, features like QoS and multicasting play important parts in the environment that an individual would be building. They further explain the need for interchange between the user environment and the provider environment and the different routing features and procedures that could affect this switch. Within the book, other topics like HSRP and IPv6 are included and detailed. Within only six chapters, the amount of detail and design helps any individual with the basic understanding of WAN technologies optimize and deploy the needed environment.

They say books and real-life meet and sometimes relate, well the timing of this book not only offered a great opportunity to gain further knowledge, but also assistance as I began to deploy and support an MPLS solution for a nationwide project within my organization. The amount of detailed information in the book ensured that all sides of the architecture and design process were covered; thereby, allowing me to deliver and meet the needs of my environment

The only way both Guichard and Cisco Press could have enhanced this material would have been to include a glossary for a quick reference to the book. Yet even with this, I believe that once again Cisco Press has made available through their large pool of authors a combination of high-end and well-developed material that I believe will help any individual. This book is not only an excellent item for any network individual's library, but should be on the quick grab shelf for many having to understand and support MPLS.

Cisco Router Firewall Security
Cisco Router Firewall Security
by Richard A. Deal
Edition: Paperback
27 used & new from $1.72

3 of 3 people found the following review helpful
4.0 out of 5 stars Securing the Edge, March 18, 2005
The Cisco Press Book "Cisco Router Firewall Security" by Richard Deal while claiming to be for individuals or organizations "using a Cisco router as a perimeter firewall solution" is much more and I believe from that quote it was designed to be a reference guide for using routers to do just that: be a perimeter firewall for an organization. But what Richard Deal delivered is not only an excellent book on implementing a router as the firewall, but a detailed guide and approach to making any organizations routers secure and safe as they should be to develop a safe environment. To emphasis my comments on this thought you simply need to look at the break down of the chapters, like Chapter 4 "Disabling Unnecessary Services", and while this is important for any perimeter device, doing it in general on a router regardless of location helps to strength the environment and deliver a more secure network.

Within the book Richard emphasizes that an individual can either read it cover to cover, or skip around and I agree that at sometimes reading cover to cover especially if you do not know a subject is an excellent approach, but with this one even not knowing and using it for the references offers is just as much benefit. Cause within the individual sections of the book there's enough information that you will not get lost as long as you have understanding of other Cisco devices like TACACS+ or general network concepts like RADIUS. Richard presents clear examples and details the steps to implement many of the book suggestions without much issue. I was able to take one of my lab routers and execute numerous of his examples without difficulty and still have the unit function as expected.

While Cisco continues to publish new IOS code for their devices Richard spends a few minutes at different points like in Chapter 6 "Basic ACL Configuration" to highlight which version of IOS is needed to accomplish the issue being explained. Considering this feature does help to enhance the value of the book even further, but amongst my favorite chapters and section was Part VI "Managing Access through Routers" for he the book combined numerous prior items from Access Control List (ACL) configuration to routing protocols and authentication proxy using features like AAA with both TACACS+ and RADIUS. These configuration examples combined with Part VIII on "Virtual Private Networks (VPN)" only go to enhance each other. Yet as mentioned before the book was designed to allow individuals to either research a sub-set of the features in a router or the entire book itself. Thus in the middle of what appears to be two clear parts that would naturally fit together Part VI and VIII, Richard places Part VII on "Detecting and Preventing Attacks" demonstrates this feature covering areas of Intrusion Detection Systems, DoS Protection and Logging Events. The concept that attacks could come in any form, but commonly from external interaction is widely known. Seeing this section of the book only goes further to enforce and emphasis the importance of securing routers to protect the network.

As anyone in the Information Technology industry is aware it is important to protect the environment and to say that this book could not help in that protection is a clear understatement. I believe that anyone from the "small business jack of all trade IT person" to the "corporate IT Network Specialist" could benefit in some manor from this book and the explanations and examples presented. If I was to say there was one thing I would do different on this book is of had it published in a hard bound cover cause Cisco Press has not often published a book that does not have a clear basis for use and this book is no except to that, thus I believe it would be a benefit and often used book of any network individuals library.

Network Security Architectures
Network Security Architectures
by Sean Convery
Edition: Hardcover
29 used & new from $9.44

12 of 12 people found the following review helpful
5.0 out of 5 stars Cisco Security for Network Architecture, December 2, 2004
Welcome to the twenty-first century in the world of computers and networking. With more issues occurring that have negative affects on the environment that information technologists work in, the knowledge of information security is slowly becoming critical. Sean Convery presents a detailed guide into the world of designing a secure network environment. Within "Network Security Architecture", Sean delves into the whys, the hows, and most importantly the cause and effect. As you examine the table of contents alone, it becomes clear that he has spent a great deal of time researching and detailing numerous different components of a network environment that have to be examined and considered for proper network security.

A close look at the book's table of contents will point out different areas that any Network Engineering individual from the Junior Administrator to the Senior Architect needs to be knowledgeable in. Sean examines policy, threats and the technologies available, he details how to harden devices and describes items that need to be considered in designing either new networks or enhancing existing ones. For these reasons alone this book is necessary for anyone that manages any portion of a computer network. This book offers far more than an education of network security. It is clearly designed not only to educate individuals, but provide a single reference for all network security areas as well.

Like many Cisco Press books, "Network Security Architectures" chapters are divided into three sections --: an introduction, the body, and finally a summary. It is these summary sections that help the most. In For example, in Chapter 6 on pages 262 thru 264, the concept of Design Consideration is summarized with charts. Where individual summaries appear light or limited, the book enhances the information covered in a section called "Applied Knowledge". This section helps individuals quickly implement what is covered in extreme detail in the chapter. Don't just look at the summary and applied knowledge sections, because this would not do all the hard work Sean placed in the book justice. For instance, in Chapter 5 on Hardening Devices, Sean provides clear examples on how to configure devices for security and hardening. This topic alone has not similarly covered since O'Reilly's book on "Hardening Cisco Routers" and that one did not go to the level of how to configure the devices fully.

As anyone that is familiar with Cisco Technology and Cisco Systems knows, they routinely publish various "SAFE" documents on topics. This book takes input from those documents, combining them with other both real world examples and theory to provide a greater combined presentation. Like any Cisco documentation this book can either be read in its entirety from cover to cover or only the sections that are needed now. But as you read the book you will realize that while "SAFE" documents focus on key issues, this book details not only the issues and the possible alternatives, but provides reasoning for implementing the recommendations in clear English. Convery's book is both an excellent resource and a great guide. Its ability to present both the Cisco and the real world philosophy on network architecture is critical for all that work in this arena.

As I mentioned previously Convery, uses the Cisco "SAFE" documents as guide points, but those are only detailed references. His book takes them to the next logical level and as such I could spend hours and pages detailing all the other reasons someone should acquiring a copy of this book, but the key reason I believe is that it is a clear consolidated source to design, implement and support a secure and highly available network. But the simple fact is in this day and age with more and more Viruses, Worms, Trojan horses, Network Probe attacks and numerous other problems in the growing Internet can anyone not afford to plan a "SMART" and "SAFE" network architecture? That is the real question that should drive someone to consider this book for there library and refer to it on a regular basis. I know I have already.

I highly recommend this excellent reference book for networking and security practitioners in any size environment. The investment will save time and money, even if only a few of the recommendations are implemented. You will find yourself referring to it frequently.

Cisco Access Control Security: AAA Administration Services
Cisco Access Control Security: AAA Administration Services
by Brandon Carroll
Edition: Paperback
26 used & new from $0.01

4.0 out of 5 stars Dummy's Guide to Cisco's ACS Product, September 17, 2004
As we enter the Twenty-First century, new issues and challenges await those in the Information Technology environment. Within the short few years that have already passed the need for more advanced and reliable security mechanisms are presented daily. As such, security has become a clear critical need for the continued operation of any business/organization and especially the information technology portion of the business. Brandon Carroll's book "Cisco Access Control Security: AAA Administration Services" provides a detailed guide for the implementation and deployment of a security solution developed and released by Cisco Systems. Within his book Cisco's Access Control Security or ACS as it is known, is detailed and presented from all aspects including, installation, configuration in various methods and daily use.

Within the book Brandon not only focuses on the application and all the items that make the Cisco's application special; but combines information on the features and components that make ACS important. His details supportive information needed to help System and Network Administrators make educated decisions on methods and purposes for the implementation of different methods of authentication from Cisco's proprietary TACACS+ to the IETF Radius protocol. Within the pages an I found information on how to establish Accounting passed on access groups and how to ensure different individuals are limited to select capabilities strictly based on the group they are in and permissions that group is provided.

Even if ACS itself is not your primary purpose for this book in the initial chapters offer sufficient information on other Cisco devices like routers and switches, that allow any individual to understand authentication and authorization features of the other devices. Brandon clearly researched these areas and provides this research to others by spending the entire chapter two (2) detailing the different commands that are affected by Authentication, Authorization and Accounting as they related to both TACACS+ and Radius. This level of detail is further demonstrated within the initial Section or Part of the book when Brandon explains other Radius applications that are not developed by Cisco, but supported by the Cisco products.

As I read the book it became clear that Brandon was not simply repeating what Cisco already provided on their web site, but he was going beyond the documentation to provide a level of detail that would make this almost a clear to understand dummy's guide to the product. In my belief this book makes an excellent supplement to the material and is clearly a must have for any Network Administrator/Engineer that needs to support Cisco's ACS product. Brandon's ability to detail in step by step procedures from installation to supporting the product enhances and defines the documentation already provided by Cisco is a clear advantage to this book. The only thing I wish I could have gotten with the book was a 90 day demo version of the product, but then again that is already available on the Cisco web site itself for download.

Planet Broadband
Planet Broadband
by Rouzbeh Yassini
Edition: Hardcover
40 used & new from $0.01

5.0 out of 5 stars High Speed Internet and its Birth..., July 7, 2004
This review is from: Planet Broadband (Hardcover)
"Planet Broadband" is not a Star Trek episode or another Sci-Fi title. It is the answer to the question: Of where the term "broadband" originated and why is it used when discussing cable internet services? This question is the base for the book "Planet Broadband" by Rouzbeh Yassini. When I first received the book, my initial thoughts where focused on the Cable Internet environment, but the book also presents the DSL side as well. This small book of 140 pages, including index, not only explains how the concept of Broadband communication evolved, but the possible directions it can go.
This book is clearly more of a history of how the concept of broadband was developed and the growth of the Internet that it leads too. I can foresee future generations of children reading this book in a college course on Information Technology. When one considers that only three to five percent of the American public use any form of broadband services, the growth potential presented is unbelievable.
Personally for me, a detail-oriented reader this took me about a total of 8 hours to complete. That may seem slow, but considering the topic and the events occurring within the world of telecommunications, that is better than I expected. As I read this book, I would pause from time to time and comment to myself on how Yassini's points are either already occurring or how I can see them occurring or already being implemented. Additionally, I found enlightenment in the knowledge that both DSL and cable Internet are actually considered broadband. While the Cable companies have a tendency to advertise themselves as a broadband service, in reality they are only one of several broadband services. Some of the concepts presented include virtual training like many universities are now offering and virtual meetings with individuals all around the world. While he does point out that everything is not immediately on demand in this day and age, within time we can witness more and more services becoming that way.
Within the book, Yassini points out the concept of being able to check the items in the refrigerator from work or have the washing machine place a service call to the manufacture before you know there is a problem. These are features of a broadband planet and within time our children and their children will not know a world where we had modems connecting to the internet or downloads that took hours. But as you read you realize that while today is the birth of broadband, this book is more the introduction to tomorrows internet and a must read. To prove the point that "Planet Broadband" is an introduction, my baby boomer mother who works in the cable industry as a customer service person, took the book from me and read it cover to cover one day and told me "This is where we are going and everything." So if a 50+ year old parent can see it we know that the world will be there some day.
Near the end of the book, Yassini focuses on telecommuting and a comparison of that to working at the office. While he clearly points out that telecommuting is not for everyone or all the time, it has productivity advantages and will only grow with time. I think one of his best examples is in Chapter 6, where he remembers the MCI commercial of a woman working at home and changing a presentation on the fly for clients and co-workers half way across the country. That image is an example of how the world has changed thanks to the advances of broadband and the ability to telecommute without being in the dark room or bound to the long commutes all the time.
As I hold the book and consider my final thoughts on the subject of "Planet broadband", this book is not designed for the IT world, but for the general public. I would recommend this as an excellent addition to anyone's library and especially to individuals in the information technology community. For management or others it is an excellent resource to justify a telecommuting policy or practice, or a good reason why they should upgrade from the modem and narrow band to the world of high speed Internet.

Fundamentals of Wireless LANs Companion Guide (Cisco Networking Academy)
Fundamentals of Wireless LANs Companion Guide (Cisco Networking Academy)
by Cisco Systems Inc.
Edition: Hardcover
31 used & new from $0.57

1 of 2 people found the following review helpful
4.0 out of 5 stars A Logical and Clear Wireless Guide, May 3, 2004
The Cisco Network Academy Program book on Wireless Networking entitled "Fundamentals of Wireless LANs" published by Cisco Press is developed for a specific audience. Normally, any Cisco Press book is geared towards individuals in the network arenas; and while many of these books are even more specific in nature, and geared to a defined set of individuals, with this book they do not forget that there are generalists that are also involved in the particular network environment that this book covers. Most of the time, possessing sufficient general knowledge of networking and how items interoperate, you can understand the text's intentions and learn from it. A key ingredient in understanding this book is to realize that wireless networking is in of itself not specific to a platform or concept, but a globally desired resource.
An initial glance of the book was used to determine what the book had to offer and whether it was worth reading. This basic scan revealed that wireless technology and the deployment of this technology is not as simple as plugging in an access point and configuring your client card. The figures and tables provide excellent examples of the importance of the process and understanding needed to deploy a wireless environment. If you look at the back cover for an overview, you are only led to believe this book is designed to assist an individual in preparing for a certification from Cisco Systems as a wireless specialist, but this book contains so much more.
I believe that this book is a must have for any individual researching the wireless networking environment, how it interoperates, and is developed; or for anyone responsible for an already established network. Having personal knowledge of deploying a large scale WLAN environment in the past and supporting it on a global basis, I wish this book had been available two years ago when I had to plan, execute and train individual network engineers on the fundamentals of a wireless network. The concepts and skills needed by any individual to develop and support any wireless environment are different from those needed for a basic network; and thus, this book helps not only educate the individual but also explains the do's and don'ts, the why's and why not's, that matter in an Radio Frequency (RF) environment.
The book is divided into five (5) clear sections (Background, Equipment, Site Security and Preparation, Managing, and finally an Appendix), each dealing with specifics. While at times this book is clearly a Cisco product and designed towards the Cisco Aironet product line as best demonstrated in Part II where the book mentions specific parts and components of the Aironet products, it still provides the general principles for designing and establishing a WLAN network regardless of vendor. With each section new information clearly builds on prior information, but also is general enough to allow an individual to only use that section. For example, in Chapter 4 Wireless Topologies, the chapter builds on prior items like wireless radio technology of Chapter 3 and the background of Part I, yet it is still independent enough to provide an understanding of how to deploy a wireless environment.
This book does come with a supplemental CD that offers several components like demos and interactive labs, in addition to a practice exam to help you prepare for the actual Cisco exam. While the practice exam questions gave me a feel for the actual exam I found the rest of the CD of no additional benefit in supplementing what was covered within the book itself. What this book makes up for in specifics of itself, its' CD lacks several features that could make it better. Among these features are audio explanations of the examples and demos. Since Cisco Press used Macromedia™ for the interactive demos and labs, it would seem only logical to include audio in the demos. I found this item a bit disconcerting and it made my exploration of the demos a bit more difficult. Otherwise, the CD is well structured and an excellent help, especially in preparing for the certification itself.
Overall, even with the problems of the CD itself, I would highly recommend this book to any individual consider adding an understanding of the wireless environment or just looking for an excellent reference book on the subject. If they are only adding to their library for the understanding of wireless networking and the need to support it; even if they are not pursuing a Cisco certification in wireless this book is a clear must have.

Learning the UNIX Operating System (In a Nutshell)
Learning the UNIX Operating System (In a Nutshell)
by Grace Todino
Edition: Paperback
82 used & new from $0.01

1 of 1 people found the following review helpful
4.0 out of 5 stars Great Starter Book, May 29, 1998
This book is ideal if you have never started or dealt with Unix before. I encourage you to look into it if you do not aquire it. Sometimes it is more helpful than one thinks.

Page: 1