Network Security Fundamentals and over one million other books are available for Amazon Kindle. Learn more
CDN$ 45.05
  • List Price: CDN$ 71.50
  • You Save: CDN$ 26.45 (37%)
Only 1 left in stock (more on the way).
Ships from and sold by
Gift-wrap available.
Add to Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Security Fundamentals Paperback – Sep 8 2004

Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 45.05
CDN$ 45.02 CDN$ 2.54

Join Amazon Student in Canada

Customers Who Bought This Item Also Bought


Product Details

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 7 reviews
5 of 5 people found the following review helpful
Picks up where "Network Security First-Step" left off! Dec 9 2005
By Mark G. Reyero - Published on
Format: Paperback
I picked up a copy of "Network Security Fundamentals" (ISBN 1587051672) by Gert De Laet and Gert Schauwers to add to my CCIE Security reading list. Network Security Fundamentals more or less picks up with Tom Thomas's "Network Security First-Step" (ISBN 1587200996). Whereas the Thomas book serves as an excellent introduction to securing your network, "Network Security Fundamentals" is an intermediate level network security book. It delves it more details not only network design essentials, but many other security topics such as Router Security, Firewalls, Intrusion Detection, VPNs, Remote Access, and Wireless.

I found the detailed coverage on Cryptography as well as securing Web Servers especially helpful and insightful. The book includes many device configuration examples, show commands, and debug outputs. I highly recommend this book to any Network Admin interested in securing his/her network as well as any potential CCIE Security candidates out there!

Mark Reyero

CCIE 12932
6 of 7 people found the following review helpful
A good start, but weak on Layer-2 defenses June 7 2007
By Jeremy NeeDLE - Published on
Format: Paperback Verified Purchase
First of all, let me state that this review is primarily in context of Cisco's 642-552 exam, since as of this writing, this is really the only book on their Recommended Reading for this particular exam. There are no Exam Certification series from Cisco for this specific exam, which is the foundation of their CCSP and Security Specialization certifications.

What is good about this title is coverage of security policy, vpn's, ids, firewalls, wireless, and PKI. Good introduction, and decent configuration examples. Certainly enough to get even a neophyte up and running.

So what is this title missing?

#1 SDM [Security Device Manager] configuration examples & exercises. Chances are if you're a newbie, you're going to be much more comfortable using the Browser-based GUI rather than the IOS Command Line. Additionally ALL the simulations for the 552 exam are based around SDM configuration. I would recommend you download SDM documentation from Cisco's website if you're planning on taking the 642-552 exam.

#2 There is inadequate coverage of common Layer 2 attacks, and the defense mechanisms to subvert them. For example, no explanation or examples are given on configuring Port Security which protects against MAC Spoofing, MAC Flooding, ARP Spoofing, and flooding the CAM table. And that is BASIC SWITCH SECURITY that is relatively easy to implement. Furthermore, there should also be discussions of IP Source Guard, VLAN Hopping, and Dynamic ARP Inspection. I HIGHLY recommend you search on Cisco's site about these features & configuring them.

#3 CBAC explanation is fairly unclear. Students will be confused by the fact that they named the ip inspect rules as "BLOCK" and "ALLOW" and associate each one w/ a traffic direction [ingress/egress respectively], when really these names do not accurately describe the behavior of CBAC

#4 Pg 174 "A software based firewall is only as secure as the operating system it relies on...Appliance based firewalls, such as NetScreen or PIX, do not have that vulnerability" ARE YOU KIDDING ME? IOS is still SOFTWARE. can be exploited. See Hacking Cisco. Certainly it is harder, yes, but it is STILL susceptible application-layer attacks and buffer overflows.
6 of 7 people found the following review helpful
Finally, a thorough overview of the topic Sept. 6 2004
By Stephen Kalman - Published on
Format: Paperback
I was privileged to be one of the tech editors for this book.

This is a great book for two audiences.

1. The network engineer who wants to explore the world of network security before selecting a niche to focus on

2. The CIO who wants to understand what the CISO and other security folks are talking about.

The coverage is wide and just deep enough. The book is a job well done.

By the way, my security certifications are CISSP, CEH and CHFI.
3 of 3 people found the following review helpful
Nice............. June 2 2005
By love to order - Published on
Format: Paperback
Excellant book for and new comer to this complexed field in Network Security. For me thought having a few certs (CCNA, CCDA, CCSA, JNCIA, CWSP, CWNA) the book is too entry level. The parts in encryption/VPN just didn't teach me anything I didn't know before opening this book.

BUT please buy this book if you are a new comer to this field. I promise; you will learn alot from this text.
3 of 3 people found the following review helpful
Spot on - Great security book Sept. 19 2004
By Guitarman - Published on
Format: Paperback
Ciscopress have released yet another jem of a book, really great read and easy to understand, the two authors known in the introduction as the Two Gert's do a splendid job of describing all the major security concerns you should be fully aware of, this book is highly recommnded and is authored by some very experienced engineers at Cisco -- you will not be dissappointed


Sydney Australia