Designing Network Security

  • Published: May 7, 1999
  • Copyright 1999
  • Dimensions: 7.375 X 9.125
  • Pages: 448
  • Edition: 1st
  • Book
  • ISBN-10: 1-57870-043-4
  • ISBN-13: 978-1-57870-043-1

Register your product to gain access to bonus material or receive a coupon.

More Information

AboutDescriptionReviewsSample Content

Features

Product Description

A practical guide to creating a secure network infrastructure

  • Understand basic cryptography and security technologies
  • Identify the threats and common attacks to a network infrastructure
  • Learn how to create a security policy
  • Find out how to recover from a security breach
  • Study specific implementation scenarios for securing your network environment

Designing Network Security is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy.

You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and some emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn to specify the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the dial-in environment.

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Customer Reviews

14 of 14 people found the following review helpful
4.0 out of 5 stars Strong on Security - Weak on Cisco, January 8, 2000
This review is from: Designing Network Security (Hardcover)
Excellent overview of network security issues. Covers almost all threats, protocols and safeguards in a concise manner. One of the books that should be read for CISSP preparation.

Bogs down when it gets to Cisco specific configurations. As a CCIE, even I find that books of this type provide only the tip of the iceberg when it comes to the complexity of Cisco configurations.

Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


14 of 14 people found the following review helpful
5.0 out of 5 stars Good Book to prepare for the MCNS examination, September 12, 1999
By A Customer
This review is from: Designing Network Security (Hardcover)
Exam 640-442 is the Security Specialistization for people who have attained their CCNP certification. Excellent coverage of AAA, TACACS+, RADIUS, PIX, 3DES, DMZ as well as IPSEC and CBAC. This is alot of material to be discussed in one book. Cisco provides a CD ROM with this same material for $250.00, this is a much better deal. If you want to enhance your knowledge of access-lists, reflexive access-lists etc. this is the book for you. Merike did her homework on this material, I completed many of the configurations presented in the book, they were accurate.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


10 of 10 people found the following review helpful
2.0 out of 5 stars Mixed Bag, October 30, 2000
Amazon Verified Purchase(What's this?)
This review is from: Designing Network Security (Hardcover)
Up through Chapter 7, this book presents a fairly good overview of information security in general, network security basics, cryptography, and a good measure of "security philosophy" as well. It reads pretty well and there are relatively few inconsistencies, until...

From Chapter 8 onwards, there are lots of mistakes (my personal favorite is a botched explanation of TCP proxies on page 248) and many cases of examples not matching the explanatory text. And when it comes to enabling TACACS+ on routers, some sections of this book directly contradict Cisco's "IOS 12 Network Security" book.

All in all, a decent reference for Cisco routers & firewalls, but you might want to supplement it with something more substantial. The O'Reilly books and Cheswick/Bellovin come to mind...

Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 17 customer reviews...

Table of Contents

I. SECURITY FUNDAMENTALS.

 1. Basic Cryptography.

 2. Security Technologies.

 3. Export Controls on Cryptography.

II. THE CORPORATE SECURITY POLICY.

 4. Threats in an Enterprise Network.

 5. Considerations for a Site Security Policy.

 6. Design and Implementation of the Corporate Security Policy.

 7. Incident Handling.

III. PRACTICAL IMPLEMENTATION.

 8. Securing the Corporate Network Infrastructure.

 9. Securing Internet Access.

10. Securing Dial-In Access.

IV. APPENDICES.

Appendix A: Sources of Technical Information.

Appendix B: Reporting and Prevention Guidelines: Industrial Espionage and Network Intrusions.

Appendix C: Port Numbers.

Glossary.

Index.

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.