"Network Security Architectures" (Cisco Press, 2004) became available back in April of 2004. My goal was to share my experiences gained while working on SAFE and consulting with customers, in a way that allows the reader to design a security system suited to the specific needs of their organization. There is very little in the way of product specific or introductory information. Instead it focuses on policy considerations, design considerations, best practices, sample designs, and case studies. If you get a chance to check out the book, I hope you enjoy the book and find it helpful in your network security endeavors. Reviews on Amazon have been positive and a review posted to ISN was also commendatory. In February of 2005 the book was favorably reviewed in ACM's magazine "Queue."
Book Web Links (by Chapter). This is to save time if you want to check out a link. Some of the URLs are really long so I thought posting them all to the web might be useful. Plus URLs are inclined to change, so I'll do a pass from time to time to check if links have changed.
Sample Chapter. This is my favorite chapter (Chapter 6: General Design Considerations) of the book and details a lot of the specific best practices that should feed into all sorts of secure network designs. Take a look at the brief table of contents to understand where the chapter fits in the flow of the book.
Book Errata. Any discovered errata will be posted here.
Attack Tables and Formulas from Chapter 3-6. This is for folks who want to insert their own values into the same tables I used for the threat and technology values used in the book. If you come up with any interesting results, feel free to drop me a line. I'd be curious to see how you rate the categories based on the technologies your organization uses and the threats you experience.