
Used price: $39.95
Buy one from zShops for: $58.19




Sally Lopez, RN, Medical Information Specialist slopez@erols.com

List price: $25.00 (that's 30% off!)
Used price: $17.38
Buy one from zShops for: $16.37






Used price: $29.00
Collectible price: $60.00






List price: $49.99 (that's 30% off!)
Used price: $33.50
Buy one from zShops for: $27.25


The book opens with a few pages on security truisms, my favorite part of the book and a dazzling display of intellect! All the material after the truisms and up to chapter 9 is a quick tour of topics like Security Policy, Host-Based Security and Perimeter Security, Authentication, and all the Protocols in a couple paragraphs each.
Chapters 9 - 12 are where the book covers perimeters. Chapter 9 is dated material, Static Packet Filters, Network Topology, Application Gateways, and SOCKS. The book begins to improve in Chapter 10, remember, these authors really know their stuff and if you read closely there is wisdom here. The "Use the phone?" comment in the H.323 and SIP example firewall rule was a classic. Sadly, this whole critically important section got one thin paragraph.
In Chapter 13, there is a fascinating discussion about using routing tricks to protect a host, but it isn't clear to me you can implement this with the four sentences of information the authors provide. As you march on to Chapter 16, they have a few paragraphs on host security, name some types of IDSes and so forth.
Chapter 16 is from the original edition, An Evening with Berferd is a lovely read especially if you have a Unix background. Chapter 17, The Taking of Clark, another war story, was also fun.
The ending of the book is sad, the technical material concludes with three and a half pages titled: Where do we go from here? They briefly mention IPv6, but come to no conclusion as to its future. DNSsec gets two paragraphs, we do not even learn what it is, (a new resource record where the information that is stored can be signed).
In the final paragraph the authors conclude we are going backward not forward, that we cannot achieve the security level Multics had in the 1970s with modern operating systems. I sincerely hope that is not true; take a look at OpenBSD, one exploitable remote vulnerability in seven years. Think about the progress RedHat and Microsoft are making. Take a look at the work The Center for Internet Security is doing, take the Unix or Windows tracks at SANS, but never, ever give up.

The authors start with hacking and security needs analysis, progress thru strategies and techniques, and end with useful security formulas, hypotheses and real life examples. They draw upon their own experiences and observations about network security and host protection to give the reader a well-rounded view of the concepts of security as they apply today. The book is well written with simple examples and antecedents. They have taken great care to explain how hackers work and their methodology. The best thing about the book is that it does not go into great detail about unnecessary finite security specifics and shows what works best while adding value by allowing the reader the opportunity to think for themselves and address their own needs. They maintain the premise that: " Simple security is better than complex security: it is easier to understand, verify, and maintain."(Page 81) while covering the types of attacks not only by method, but also by class, ranging from the kiddie script up to the sophisticated tunneling and VPN methods.
FWAIS 2.0 is a comprehensive guide to the most common security problems while not wasting time on the insignificant. It includes a good set of general rules and the tool sets necessary to secure a network at any level. FAWAIS 2.0 covers current protocols and allows simple guidelines for flexibility in determining your own network needs. It describes the weaknesses in both hardware and software while addressing their relational aspects in easy to understand terms. Written with Freebsd in mind many of the techniques in this edition adapt well to other sources such as Linux, Os/X, Unix, NetBsd, and Solaris.
The entire premise of the book revolves around the concept that old style layered security is not as good as it may appear. And that internet security and firewalls are a holistic endeavor of system integration and design. The authors have taken care to show just how difficult it can be to keep up with large network topology and lend truth to the fact that;
"There is no such thing as absolute security." (Page 3)
The concepts found in this book cover subjects such as :
What firewalls can and cannot do, capabilities and weaknesses.
What filtering services work best.
What services and practices are overkill.
Why firewalls are necessary, the risks to servers and the servers relationship to proper firewall installation.
What the steps to hacking are and the methodology used to break into a host.
The why, what and where of limiting services and the tools to secure the appropriate functions.
Types of firewalls and best practices for implementing security while building and designing firewalls.
Why building your own firewalls may be your best solution.
Applying past experiences to your firewall design.
Intrusion detection systems and their role as a network tool in firewall construction.
Honey pot examples showing how the techniques have been used to thwart and frustrate potential adversaries.
This is not a how to book written with step-by-step specific fill in the blanks, connect the dots, detailed mechanical guidelines, it addresses the real needs of the administrator in relation to actual daily situations. As they state on page 213 "-we don't think the hard part of firewall administration is data entry, it is knowing what the appropriate policies are."
The second edition is well documented and includes plenty of good link references, appendices and bibliography resources to help any professional keep current with the ever-changing environment of network defense.
Any organization evaluating current security needs should find the second edition helpful for determining their security goals and a comprehensive guide to help design, implement and deploy firewalls. The second edition is a definite must for any security library, certification-training program or public/private classroom situation.
I recommend Firewalls and Internet Security as the best starting point for anyone who might be considering any changes in company security structure or earning their security certifications.

It's written by two people that developed the firewall as we know it today.
They share their stories of actual security breaches, and how the tracked and resolved the problem.
To get the most out of this book you should have an understanding of TCP/IP, UDP, and other internet protocols.
The book takes you through why you need security and developing a security policy. It gives you an overview of TCP/IP.
The book does a good job of teaching you about the different types of firewalls available from firewall gateways, to application gateways.
This is a must have book for all system administrators, not just security folks.

Used price: $4.19
Buy one from zShops for: $5.51


This is possibly the most error-filled programming text I've seen. There are typos on practically every page, even in some of the code examples. It's not a long book -- somebody should have proofread it once.

It's a bit lite on the "Distributed" stuff, one chapter and no real Distrubuted Example Walkthrough. Also, Skip the Chapter on Connection Points, it's not as well written as the rest of the book (which is !)
A bit much from Prentice Hall for a 290 page book but the CD makes up the difference. You get all the Example Source Code (and a web site from the Authors and not PH for Updates), a full electronic copy of the book in PDF format for your laptop, and a pretty cool Computer Based Training and Knowledge Testing Package from CBT on COM Programming with VC++ v5.0)
Conclusion: I found the book to be a pretty easy read, a very good intro to COM Development, and a good resource for my library. IF you read this book and do the examples, you WILL be able to write enrty level COM componants with VC++ and ATL.
Overall - A Good Buy - Worth the money.


Used price: $28.00
Collectible price: $21.18

Used price: $10.00
Collectible price: $19.06

Used price: $42.00
This book's well-arranged chapters provide detailed information on the pathology of several types of malignant tumours, before going ahead with their respective diagnosis, management and treatment. Its overview is sound and clear: a useful tool that every oncologist, G.P., or student would cherish.
The included CD-ROM is a big plus: especially for those who need something portable to lug around.