1/03/2012

Network Security Architectures Review

Network Security Architectures
Average Reviews:

(More customer reviews)
Welcome to the twenty-first century in the world of computers and networking. With more issues occurring that have negative affects on the environment that information technologists work in, the knowledge of information security is slowly becoming critical. Sean Convery presents a detailed guide into the world of designing a secure network environment. Within "Network Security Architecture", Sean delves into the whys, the hows, and most importantly the cause and effect. As you examine the table of contents alone, it becomes clear that he has spent a great deal of time researching and detailing numerous different components of a network environment that have to be examined and considered for proper network security.
A close look at the book's table of contents will point out different areas that any Network Engineering individual from the Junior Administrator to the Senior Architect needs to be knowledgeable in. Sean examines policy, threats and the technologies available, he details how to harden devices and describes items that need to be considered in designing either new networks or enhancing existing ones. For these reasons alone this book is necessary for anyone that manages any portion of a computer network. This book offers far more than an education of network security. It is clearly designed not only to educate individuals, but provide a single reference for all network security areas as well.
Like many Cisco Press books, "Network Security Architectures" chapters are divided into three sections --: an introduction, the body, and finally a summary. It is these summary sections that help the most. In For example, in Chapter 6 on pages 262 thru 264, the concept of Design Consideration is summarized with charts. Where individual summaries appear light or limited, the book enhances the information covered in a section called "Applied Knowledge". This section helps individuals quickly implement what is covered in extreme detail in the chapter. Don't just look at the summary and applied knowledge sections, because this would not do all the hard work Sean placed in the book justice. For instance, in Chapter 5 on Hardening Devices, Sean provides clear examples on how to configure devices for security and hardening. This topic alone has not similarly covered since O'Reilly's book on "Hardening Cisco Routers" and that one did not go to the level of how to configure the devices fully.
As anyone that is familiar with Cisco Technology and Cisco Systems knows, they routinely publish various "SAFE" documents on topics. This book takes input from those documents, combining them with other both real world examples and theory to provide a greater combined presentation. Like any Cisco documentation this book can either be read in its entirety from cover to cover or only the sections that are needed now. But as you read the book you will realize that while "SAFE" documents focus on key issues, this book details not only the issues and the possible alternatives, but provides reasoning for implementing the recommendations in clear English. Convery's book is both an excellent resource and a great guide. Its ability to present both the Cisco and the real world philosophy on network architecture is critical for all that work in this arena.
As I mentioned previously Convery, uses the Cisco "SAFE" documents as guide points, but those are only detailed references. His book takes them to the next logical level and as such I could spend hours and pages detailing all the other reasons someone should acquiring a copy of this book, but the key reason I believe is that it is a clear consolidated source to design, implement and support a secure and highly available network. But the simple fact is in this day and age with more and more Viruses, Worms, Trojan horses, Network Probe attacks and numerous other problems in the growing Internet can anyone not afford to plan a "SMART" and "SAFE" network architecture? That is the real question that should drive someone to consider this book for there library and refer to it on a regular basis. I know I have already.
I highly recommend this excellent reference book for networking and security practitioners in any size environment. The investment will save time and money, even if only a few of the recommendations are implemented. You will find yourself referring to it frequently.

Click Here to see more reviews about: Network Security Architectures



Buy Now

Click here for more information about Network Security Architectures

No comments:

Post a Comment