book aims to educate networking professionals with the
knowledge required to install, configure, operate, and
manage Cisco network security products. If you have
a Cisco-driven network this book will be useful, and
if not, it's a good idea to skip this and read the security
manuals provided by your equipment and OS vendors.
If your network uses CiscoWorks 2000 ACL Manager, Cisco
Secure Policy Manager, Cisco ACS, Cisco PIX Firewall,
and VPN/Security Management Solution the book is a fine
handbook for maintenance and management of the various
tool and applications.
The basics of network security explained in the beginning
are regardless of the equipment vendor of your network.
Once the basics are over, the Cisco-specific information
Users of Cisco products will find the implementation
of AAA (Authentication, Authorization, and Accounting)
in the network access server, VPN configuration, and
Cisco IOS IPSec review interesting.
Implementation of AAA talks about authentication mechanisms
like RADIUS, PAP, Kerberos, and CHAP. VPN configuration
and security deals with Layer 2 protocols and IPSec.
And configuration of Cisco IOS IPSec talks about the
encryption configurations in moderate detail.
Towards the end are two large sections dedicated to
the basics of networking. The text explains networking
right from the topologies, connectors, and the OSI Levels.
A good idea if you want to refresh your knowledge of
basics, but for most IS Managers and CTOs, the sections
can be given a miss.
It's a good guide if you want to frame or update your
security policy. It may show you aspects about your
Cisco equipment that you may not have explored earlier.
Overall, a handy guide to have around on your bookshelf.
Title: Cisco Security Bible
Rajesh Kumar Sharma
IDG Books India (P) Ltd
Price: Rs 429/-
stop a hacker…
seems no security solution is perfect. One may have
the best Firewalls and security systems in place, but
that's not enough to keep out hackers. So, the only
way to stop a hacker is to think like one.
Hack Proofing Your Network approaches
network security from the other direction. It shows
us how to penetrate systems, instead of talking about
things like firewall configuration. Call it 'Ethical
Hacking' if you must, but the authors believe this is
the best way to tell how an attacker will perceive our
The book is meant for users of all skill levels. In
fact the first five chapters cover some theory, concepts
that every security professional should be aware of.
If you're new to all this, then you should read about
the Laws of Security (how security works), the types
of attacks and the potential damage, the various methodologies
for discovering security problems, and hacking techniques.
This Second Edition also includes new topics like Hardware
hacking, Tunneling, IDS evasion and Format
string attacks. In addition, other chapters have
been updated to address new technologies and techniques.
The list of contributing authors includes security consultants,
security engineers, and programmers who have developed
By way of value, the book offers nuggets of information
like Website links for security tools and information,
and Notes from the underground, stuff that
you'll find only in security bulletins.
Title: Hack Proofing your Network
IDG Books India (P) Ltd