Well i think this book explains everything there is to know about ISA server. Configuring an ISA was always pain in the neck though, i gotta admit though before i've finished this book, reconfiguring an ISA server took me much longer, now i do it within 2 hours. I like this book, though i think author could make it much shorter, i don't think some one actually cares where ISA server got from and the history of it's design,...
0Report
I had to deploy an ISA server and i had a week to get it up and running.After looking around for the best text, i purchased this one.Believe me it has everything you could ever want to learn about configuring an ISA server, and much much more!! I have never written an book review but i had to with this one.The book takes some time to go through because it has so much information. It's quality information,not a bunch of bloated...
0Report
I purchased this book because we required ISA Server setup in our organization. Our previous firewall was Checkpoint, but management wanted a new MS solution.Virtually everything I needed to know was within this text. The documentation provided with the product was difficult to understand, but the book explained not only the theory, but the differences between how ISA Server is supposed to work, and how it works in practice...
0Report
Been waiting for a long time for this one, but it turns out to be worth it. I really liked the background and design info in the first chapters, and how the book takes you all the way from basic security concepts to very specific scenarios on configuring and administering ISA.Just about everything is covered, and what's really neat is that things are explained so a beginner can understand, but you've also got all these advanced...
0Report
I bought this book because I've seen the great work Dr. Shinder has done on the Microsoft Public Newsgroups and at isaserver.org. I was not disappointed! He put in all the fine details about how services work and the step by steps actually explain what each option means and how it works. What I liked most was the "Undocumented Secrets" sections where he explains thngs like how not to assign the Firewall Client via Group Policy...
0Report