Network Security", Chris Brenton/Cameron Hunt,
2003, 0-7821-4142-0, U$49.99/C$79.95/UK#37.99
%A Chris Brenton firstname.lastname@example.org
%A Cameron Hunt email@example.com
%C 1151 Marina Village Parkway, Alameda, CA 94501
%I Sybex Computer Books
%O U$49.99/C$79.95/UK#37.99 800-227-2346 firstname.lastname@example.org
%P 490 p.
%T "Mastering Network Security, Second Edition"
introduction states that this book is aimed at systems
administrators who are not security experts, but have
responsibility for ensuring the integrity of their systems.
would seem to cover most sysadmins. However, whether
the material in
this work is at a suitable level for most sysadmins is
question. Now, to be fair to the authors, it seems that
edition is a reissue, only marginally revised, of a book
originally published seven years ago. (Under most standard
publishers have the right to do this, and authors can't
do much about
it.) At that point, the material might have been pretty
Currently, it isn't.
one discusses systems theory. While the application
text to network and security management is reasonably
hypothetical terms, it is not at all clear in regard
operation in the real world. (This is particularly true
for those who
are not security professionals.) The systems development
(SDLC) is covered in chapter two and, again, while it
is an important
topic, the relation to security is not made manifest.
introduction to networking itself covers the OSI (Open
Interconnection) model, routing, and bits of TCP/IP,
in chapter three.
One would have thought that this would have been old
sysadmins. The same is true of the material on transmission
network topology, in chapter four. There is some mention
issues, but the discussion is minimal.
five has a reasonable overview of firewalls, although
terminology is not always standard. Chapter six is documentation
the Cisco PIX firewall. The information about intrusion
systems, in chapter seven, provides good material on
neglected by other works, and adds a guide to Snort.
The coverage of
cryptography, in chapter eight, has a confusing structure.
the material on virtual private networks consists of
screen shots of
Microsoft's RRAS (Routing and Remote Access Server),
in chapter nine.
ten relies on old concepts and technologies to discuss
and other malware. Disaster prevention and recovery,
eleven, concentrates on building redundancy and the VERITAS
based backup system. A good deal of information about
of which may have some relevance to security, is in chapter
Some introductory, and some network, data about UNIX
is available in
chapter thirteen. Chapter fourteen describes how information
obtained about your system in order to mount an intrusion
Some resources for security are mentioned in chapter
the book does provide a fair amount of information
likely be of help to most network administrators in securing
systems and networks. However, there is also a lot of
detail that is
not directly relevant to the task, some erroneous content,
and not a
few gaps. While the original authors may have mastered
the volume currently on offer does not reflect that.
copyright Robert M. Slade, 2002 BKMSNTSC.RVW 20021220