Jump to ratings and reviews
Rate this book

Inside Network Perimeter Security

Rate this book
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.

734 pages, Paperback

First published June 28, 2002

3 people are currently reading
39 people want to read

About the author

Stephen Northcutt

14 books7 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (10%)
4 stars
20 (42%)
3 stars
16 (34%)
2 stars
5 (10%)
1 star
1 (2%)
Displaying 1 - 4 of 4 reviews
Profile Image for Scott.
155 reviews10 followers
August 28, 2010
I read this for a class that I took, and it wasn't as useful to me as I might help. While it covers the basic concepts of Network Perimeter Security, as it goes farther in depth, it misses the sweet spot of more specific information versus tool-specific advice.

My feeling is that any written book needs to be careful when giving tool specific advice, providing me examples on how to set a specific CISCO router is useless if the industry has moved beyond using that router - therefore, it renders much of the book less than useful as, at the moment, I'm not sure what environment I'll be put in.

However, I did find the award winning network perimeter examples/case studies to be quite useful when conceptualizing an "ideal" perimeter. Overall, if you've got the cash to burn, pick up the book, especially if you are newish to the field (like me!), but don't expect it to stay on your shelf for frequent referencing.
Profile Image for Beck Frost.
313 reviews14 followers
June 23, 2015
Read for a class I was taking. Very technical in nature as the first 120 pages gives you all kinds of Cisco router commands. Then, at that point, it tells you that the first thing that you should have done was setup a policy before proceeding. Hum...shouldn't the policy have been the first section then? Written by engineers and it shows since that was the order of precedence to give us technical commands first. Good reference book, though.
Profile Image for Jeremy Needle.
Author 3 books2 followers
July 23, 2008
Extremely thorough discussion of technology and processes involved in securing a network. This is definitely one of those books that every network admin should in their library.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.