Applied Network Security

Arthur Salmon, Warun Levesque, Michael McLafferty

Published by

Packt Publishing


RRP £37.99
Reviewed by A P Sutcliffe MSc CCI, MBCS

8 out of 10

Network security is an important topic and one that has received a high level of focus over the last decade; yet there are still major breaches on a far too regular basis, showing that there is still a need for a lot more active preparation in this field. This book discusses some of the most frequent attack vectors, and provides a useful analysis of these; and it offers practical advice on how to approach the subject of security within those areas.

Unlike many other books on this topic, it could be used by relative newcomers to the field; it starts with some broad outlines that are expanded in simple terms, as a way of introducing the importance and value of security, before it dives into the more complex narrative. It also contains some examples of useful tools and scripts, which provide a great way to build on skills and knowledge; and could easily be used by those newcomers just starting out, as well as more experienced staff from other areas of IT looking to cross train.

The text is well organised, and despite the technical nature of the book, makes it easy to follow the individual activities, as well as the overall topic. There are a number of exercises that provide some discussion on the suitability of the various tools, along with clear instructions on how to use them, and more importantly how to interpret results; although these are a little bit limited due to the need to cover so much material. It also provides a very large amount of references, for additional reading to build upon the subject, and this enhances the value of the book.

I would highlight that it only refers to IPv4 throughout the book, which is disappointing; IPv6 has been around for some considerable time, and although it is still only in limited use, there is a need to start building skills in that area as well. However, it could be argued that the book is primarily for those that will be working on a private network, so this should not be seen as too much of a problem; however, it might well be argued that a companion book to deal with IPv6 would be most welcome.

This would be a valuable book for anyone working in IT, and one that would repay the cost of purchase in a relatively short period of time.

Further information: Packt Publishing

September 2017