Archives ||  About Us ||  Advertise ||  Feedback ||  Subscribe-
 Home > Readerware
 Print Friendly Page ||  Email this story

Securing business networks

The book aims to educate networking professionals with the knowledge required to install, configure, operate, and manage Cisco network security products. If you have a Cisco-driven network this book will be useful, and if not, it's a good idea to skip this and read the security manuals provided by your equipment and OS vendors.

If your network uses CiscoWorks 2000 ACL Manager, Cisco Secure Policy Manager, Cisco ACS, Cisco PIX Firewall, and VPN/Security Management Solution the book is a fine handbook for maintenance and management of the various tool and applications.

The basics of network security explained in the beginning are regardless of the equipment vendor of your network. Once the basics are over, the Cisco-specific information begins.

Users of Cisco products will find the implementation of AAA (Authentication, Authorization, and Accounting) in the network access server, VPN configuration, and Cisco IOS IPSec review interesting.

Implementation of AAA talks about authentication mechanisms like RADIUS, PAP, Kerberos, and CHAP. VPN configuration and security deals with Layer 2 protocols and IPSec. And configuration of Cisco IOS IPSec talks about the encryption configurations in moderate detail.

Towards the end are two large sections dedicated to the basics of networking. The text explains networking right from the topologies, connectors, and the OSI Levels. A good idea if you want to refresh your knowledge of basics, but for most IS Managers and CTOs, the sections can be given a miss.

It's a good guide if you want to frame or update your security policy. It may show you aspects about your Cisco equipment that you may not have explored earlier. Overall, a handy guide to have around on your bookshelf.

Title: Cisco Security Bible
Author: Rajesh Kumar Sharma
Publisher: IDG Books India (P) Ltd
Pages: 780
Price: Rs 429/-

To stop a hacker…

It seems no security solution is perfect. One may have the best Firewalls and security systems in place, but that's not enough to keep out hackers. So, the only way to stop a hacker is to think like one.

Hack Proofing Your Network approaches

network security from the other direction. It shows us how to penetrate systems, instead of talking about things like firewall configuration. Call it 'Ethical Hacking' if you must, but the authors believe this is the best way to tell how an attacker will perceive our defenses.

The book is meant for users of all skill levels. In fact the first five chapters cover some theory, concepts that every security professional should be aware of.

If you're new to all this, then you should read about the Laws of Security (how security works), the types of attacks and the potential damage, the various methodologies for discovering security problems, and hacking techniques.

This Second Edition also includes new topics like Hardware hacking, Tunneling, IDS evasion and Format string attacks. In addition, other chapters have been updated to address new technologies and techniques.

The list of contributing authors includes security consultants, security engineers, and programmers who have developed security tools.

By way of value, the book offers nuggets of information like Website links for security tools and information, and ‘Notes from the underground,’ stuff that you'll find only in security bulletins.

Title: Hack Proofing your Network
Second Edition
Author: Ryan Russell
Publisher: IDG Books India (P) Ltd
Pages: 789
Price: Rs 399/-

- <Back to Top>-  

© Copyright 2001: Indian Express Group (Mumbai, India). All rights reserved throughout the world. This entire site is compiled in Mumbai by The Business Publications Division of the Indian Express Group of Newspapers. Site managed by BPD